Sciweavers

981 search results - page 39 / 197
» Security Requirements for Management Systems Using Mobile Ag...
Sort
View
KIVS
1999
Springer
15 years 5 months ago
Mobile Agents as an Architectural Concept for Internet-Based Distributed Applications - The WASP Project Approach
Abstract. After introducing the concept of mobile agents and potential application domains, we motivate why mobile agent technology is an interesting concept for large Internet-bas...
Stefan Fünfrocken, Friedemann Mattern
ATAL
2003
Springer
15 years 6 months ago
Modelling secure multiagent systems
Security plays an important role in the development of multiagent systems. However, a careful analysis of software development processes shows that the definition of security requ...
Haralambos Mouratidis, Paolo Giorgini, Gordon A. M...
ICDE
2003
IEEE
137views Database» more  ICDE 2003»
15 years 6 months ago
Personalized Portals for the Wireless and Mobile User; a Mobile Agent Approach
The Wireless environment requires new type of services and new ways for structuring the needed content. Personalization comes into aid via the creation of personalized portals tha...
Christoforos Panayiotou, George Samaras
DOA
2001
94views more  DOA 2001»
15 years 2 months ago
How to Monitor and Control Resource Usage in Mobile Agent Systems
The Mobile Agent technology has already shown its advantages, but at the same time has already remarked new problems currently limiting its diffusion in commercial environments. A...
Paolo Bellavista, Antonio Corradi, Cesare Stefanel...
IJNSEC
2008
129views more  IJNSEC 2008»
15 years 1 months ago
LAMAIDS: A Lightweight Adaptive Mobile Agent-based Intrusion Detection System
Intrusion detection system (IDS) has become an essential component of a computer security scheme as the number of security-breaking attempts originating inside organizations is in...
Mohamad A. Eid, Hassan Artail, Ayman I. Kayssi, Al...