Sciweavers

178 search results - page 1 / 36
» Threat analysis and security architecture of mobile agent ba...
Sort
View
NOMS
2000
IEEE
13 years 9 months ago
Threat analysis and security architecture of mobile agent based management systems
Security issues are very important for the acceptance of mobile agent technology in management. We present a threat analysis and security architecture for these problems.
Helmut Reiser, Gerald Vogt
ISCC
2000
IEEE
125views Communications» more  ISCC 2000»
13 years 9 months ago
Security Requirements for Management Systems Using Mobile Agents
Flexible and distributed management systems based on mobile agents have certain advantages over centralized and static management architectures. However, security plays a decisive...
Helmut Reiser, Gerald Vogt
SOCA
2007
IEEE
13 years 11 months ago
Mobile Agent and Web Service Integration Security Architecture
Mobile agent technology and Web Service technology compensate each other and play very important roles in eservice applications. The mechanism of Web Services technology naturally...
Junqi Zhang, Yan Wang 0002, Vijay Varadharajan
COMCOM
2000
95views more  COMCOM 2000»
13 years 4 months ago
Countermeasures for mobile agent security
: Security is an important issue for the widespread deployment of applications based on software agent technology. It is generally agreed that without the proper countermeasures in...
Wayne A. Jansen
MAS
1998
Springer
153views Communications» more  MAS 1998»
13 years 9 months ago
Authentication for Mobile Agents
In mobile agent systems, program code together with some process state can autonomously migrate to new hosts. Despite its many practical benefits, mobile agent technology results i...
Shimshon Berkovits, Joshua D. Guttman, Vipin Swaru...