MOBILE AGENT SECURITY AGAINST MALICIOUS PLATFORMS

被引:5
作者
Ssekibuule, Richard [1 ]
机构
[1] Makerere Univ, Fac Comp & IT, Kampala, Uganda
关键词
malicious platforms; mobile agent; security; threats; ITINERARIES; PROTOCOL; TRUST;
D O I
10.1080/01969722.2010.511550
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This article presents a review of security mechanisms that have been developed for mobile agent security against malicious platforms. It has been almost 10 years since a prominent review of security in agent systems was presented by Jansen (2000). We present new developments that have been suggested over the years, evaluate limitations of these schemes, and highlight possible areas of improvement. This article further presents possible threats to the mobile agent paradigm and distinguishes between detection and prevention security mechanisms.
引用
收藏
页码:522 / 534
页数:13
相关论文
共 50 条
[31]   A Novel Free-Roaming Mobile Agent Security Protocol against Colluded Truncation Attack by ACK [J].
Lei, Silei ;
Zhang, Rui ;
Liu, Jun ;
Xiao, Junmo .
ISCSCT 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY, VOL 1, PROCEEDINGS, 2008, :612-616
[32]   Security in the Firefox OS and Tizen Mobile Platforms [J].
Gadyatskaya, Olga ;
Massacci, Fabio ;
Zhauniarovich, Yury .
COMPUTER, 2014, 47 (06) :57-63
[33]   Threats to the trust model of mobile agent platforms [J].
Fragkakis, Michail ;
Alexandris, Nikolaos .
ICSOFT 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON SOFTWARE AND DATA TECHNOLOGIES, VOL PL/DPS/KE, 2008, :175-180
[34]   Identifying the Split Personality of the Malicious Host in the Mobile Agent Environment [J].
Venkatesan, S. ;
Chellappan, C. .
2008 4TH INTERNATIONAL IEEE CONFERENCE INTELLIGENT SYSTEMS, VOLS 1 AND 2, 2008, :623-627
[35]   N-grams Based Supervised Machine Learning Model for Mobile Agent Platform Protection against Unknown Malicious Mobile Agents [J].
Bagga, Pallavi ;
Hans, Rahul ;
Sharma, Vipul .
INTERNATIONAL JOURNAL OF INTERACTIVE MULTIMEDIA AND ARTIFICIAL INTELLIGENCE, 2017, 4 (06) :33-39
[36]   Solutions for Security in Mobile Agent System [J].
Dayal, Neelam ;
Aswathi, Lalit Kumar .
PROCEEDINGS OF INTERNATIONAL CONFERENCE ON INTERNET COMPUTING AND INFORMATION COMMUNICATIONS (ICICIC GLOBAL 2012), 2014, 216 :103-110
[37]   A security framework for mobile agent systems [J].
Samet, Donies ;
Ktata, Farah Barika ;
Ghedira, Khaled .
AUTOMATED SOFTWARE ENGINEERING, 2024, 31 (01)
[38]   A Security Strategy of Mobile Agent System [J].
Li, Ying ;
Hu, BaoFang ;
Wei, ChengLin .
INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS II, PTS 1-3, 2013, 336-338 :2401-+
[39]   A security framework for mobile agent systems [J].
Donies Samet ;
Farah Barika Ktata ;
Khaled Ghedira .
Automated Software Engineering, 2024, 31
[40]   Security in the Ajanta mobile agent system [J].
Karnik, NM ;
Tripathi, AR .
SOFTWARE-PRACTICE & EXPERIENCE, 2001, 31 (04) :301-329