Sciweavers

2808 search results - page 23 / 562
» Mobile Agent Security
Sort
View
AGENTS
1997
Springer
15 years 6 months ago
Real-Time Control of Attention and Behavior in a Logical Framework
We describe a uniform technique for representing both sensory data and the attentional state of an agent using a subset of modal logic with indexicals. The resulting representatio...
Ian Horswill
ATAL
2004
Springer
15 years 7 months ago
Self-Protected Mobile Agents
In this paper, we present a new solution for the implementation of flexible protection mechanisms in the context of mobile agent systems, where security problems are currently a ...
Joan Ametller, Sergi Robles, Jose A. Ortega-Ruiz
ICDCSW
2003
IEEE
15 years 7 months ago
Privilege Delegation and Agent-Oriented Access Control in Naplet
Access control in existing Java-based mobile agents is mostly based on code source due to limitations of early Java security architecture. That is, authorization is based on where...
Cheng-Zhong Xu, Song Fu
CIS
2004
Springer
15 years 7 months ago
A Scalable and Reliable Mobile Agent Computation Model
This paper presents a high performance service based mobile agent computation model. The scalability and reliability of this model is secured through the service clone policy and a...
Yong Liu, Congfu Xu, Zhaohui Wu, Yunhe Pan
ICETE
2004
253views Business» more  ICETE 2004»
15 years 3 months ago
BLAZE: A Mobile Agent Paradigm for VoIP Intrusion Detection Systems
ser provides abstraction for supporting flexible security policies that can be developed using the low-level primitives of the browser. We believe our browser architecture will be ...
Kapil Singh, Son T. Vuong