Mobile agents system security: A systematic survey
A pivotal cause for the boom of Mobile Agent paradigm relies on the competence to ward off
security attacks. This article surveys the prevalent attacks on the mobile agents and the …
security attacks. This article surveys the prevalent attacks on the mobile agents and the …
A scheme for privacy-preserving data dissemination
An adequate level of trust must be established between prospective partners before an
interaction can begin. In asymmetric trust relationships, one of the interacting partners is …
interaction can begin. In asymmetric trust relationships, one of the interacting partners is …
Agent's security during communication in mobile agents system
Security is a very important concept in the growth and the development of the mobile agent
technology. However, in most of researches, security properties are envisaged in the …
technology. However, in most of researches, security properties are envisaged in the …
[PDF][PDF] A comparative performance evaluation model of mobile agent versus remote method invocation for information retrieval
Y El-Gamal, K El-Gazzar, M Saeb - International Journal of …, 2007 - researchgate.net
The development of distributed systems has been affected by the need to accommodate an
increasing degree of flexibility, adaptability, and autonomy. The Mobile Agent technology is …
increasing degree of flexibility, adaptability, and autonomy. The Mobile Agent technology is …
Domino: Exploring mobile collaborative software adaptation
Abstract Social Proximity Applications (SPAs) are a promising new area for ubicomp
software that exploits the everyday changes in the proximity of mobile users. While a number …
software that exploits the everyday changes in the proximity of mobile users. While a number …
[PDF][PDF] Private and Trusted Collaborations
Some level of trust must be established before any collaboration or interaction can take
place. Since trust and privacy are closely intertwined, a mere possibility of a privacy violation …
place. Since trust and privacy are closely intertwined, a mere possibility of a privacy violation …
Security system for migrating crawlers
A Dixit, AK Sharma - 2011 International Conference on …, 2011 - ieeexplore.ieee.org
Owing to their inherent security problems, migrants have limited applications especially
when they are more prone to misuse by some other applications, resulting in increase in the …
when they are more prone to misuse by some other applications, resulting in increase in the …
[BOOK][B] A security framework for mobile agent systems
OM Paracha - 2009 - books.google.com
Agent technology is a novel approach for the development of distributed systems. In
particular, mobile agents can provide much greater flexibility and robustness than the …
particular, mobile agents can provide much greater flexibility and robustness than the …
A bottom-up, view-point invariant human detector
We propose a bottom-up human detector that can deal with arbitrary poses and viewpoints.
Heads, limbs and torsos are individually detected, and an efficient assembly strategy is used …
Heads, limbs and torsos are individually detected, and an efficient assembly strategy is used …
Introducing mobile home agents into the distributed authentication protocol to achieve location privacy in mobile IPv6
A Georgiades, Y Luo, A Lasebae… - International Journal of … - repository.mdx.ac.uk
Mobile IPv6 will be the basis for the fourth generation 4G networks which will completely
revolutionize the way telecommunication devices operate. This paradigm shift will occur due …
revolutionize the way telecommunication devices operate. This paradigm shift will occur due …