Mobile agents system security: A systematic survey

P Bagga, R Hans - ACM Computing Surveys (CSUR), 2017 - dl.acm.org
A pivotal cause for the boom of Mobile Agent paradigm relies on the competence to ward off
security attacks. This article surveys the prevalent attacks on the mobile agents and the …

A scheme for privacy-preserving data dissemination

L Lilien, B Bhargava - IEEE Transactions on Systems, Man, and …, 2006 - ieeexplore.ieee.org
An adequate level of trust must be established between prospective partners before an
interaction can begin. In asymmetric trust relationships, one of the interacting partners is …

Agent's security during communication in mobile agents system

C Zrari, H Hachicha, K Ghedira - Procedia Computer Science, 2015 - Elsevier
Security is a very important concept in the growth and the development of the mobile agent
technology. However, in most of researches, security properties are envisaged in the …

[PDF][PDF] A comparative performance evaluation model of mobile agent versus remote method invocation for information retrieval

Y El-Gamal, K El-Gazzar, M Saeb - International Journal of …, 2007 - researchgate.net
The development of distributed systems has been affected by the need to accommodate an
increasing degree of flexibility, adaptability, and autonomy. The Mobile Agent technology is …

Domino: Exploring mobile collaborative software adaptation

M Bell, M Hall, M Chalmers, P Gray, B Brown - Pervasive Computing: 4th …, 2006 - Springer
Abstract Social Proximity Applications (SPAs) are a promising new area for ubicomp
software that exploits the everyday changes in the proximity of mobile users. While a number …

[PDF][PDF] Private and Trusted Collaborations

B Bhargava, L Lilien - Proc. Secure. Knowledge Management …, 2004 - cerias.purdue.edu
Some level of trust must be established before any collaboration or interaction can take
place. Since trust and privacy are closely intertwined, a mere possibility of a privacy violation …

Security system for migrating crawlers

A Dixit, AK Sharma - 2011 International Conference on …, 2011 - ieeexplore.ieee.org
Owing to their inherent security problems, migrants have limited applications especially
when they are more prone to misuse by some other applications, resulting in increase in the …

[BOOK][B] A security framework for mobile agent systems

OM Paracha - 2009 - books.google.com
Agent technology is a novel approach for the development of distributed systems. In
particular, mobile agents can provide much greater flexibility and robustness than the …

A bottom-up, view-point invariant human detector

N Thome, S Ambellouis - 2008 19th International Conference …, 2008 - ieeexplore.ieee.org
We propose a bottom-up human detector that can deal with arbitrary poses and viewpoints.
Heads, limbs and torsos are individually detected, and an efficient assembly strategy is used …

Introducing mobile home agents into the distributed authentication protocol to achieve location privacy in mobile IPv6

A Georgiades, Y Luo, A Lasebae… - International Journal of … - repository.mdx.ac.uk
Mobile IPv6 will be the basis for the fourth generation 4G networks which will completely
revolutionize the way telecommunication devices operate. This paradigm shift will occur due …