You are here

An Effective Method for Protecting the Integrity of Mobile Agent

Journal Name:

Publication Year:

Abstract (2. Language): 
A mobile agent is software which performs an action autonomously and independently as a person or organizations assistance. Mobile agents are used for searching information, retrieval information, filtering, intruder recognition in networks, and so on. One of the important issues of mobile agent is their security. It must consider different security issues in effective and secured usage of mobile agent. One of those issues is the integrity’s protection of mobile agents.In this paper, the advantages and disadvantages of each method, after reviewing the existing methods, is examined. Regarding to this matter that each method has its own advantage or disadvantage, it Seems that by combining these methods and using Agents Attributes one can reach to a better method for protecting the integrity of mobile agents. Therefore, this method is provided in this paper and then is evaluated in terms of existing method. Finally, this method is simulated and its results are the sign of improving the possibility of integrity’s protection of mobile agents.
1111
1117

REFERENCES

References: 

[1] Martin L. Griss , “ Software Agents as Next Generation SoftwareComponents,”
Component-based Software Engineering: Putting the
[2] Pieces Together, pp.: 641–657.
[3] Borselius N., “Mobile agent security,” Electronic & Communication Engineering
Journal, Vol. 14, No. 5, 2002.
[4] Jansen W., “C ountermeasures for Mobile Agent Security,” Componentbased Software
Engineering.
[5] Bierman E., Cloete E., “Classification of Malicious Host Threats in Mobile Agent
Computing,” ACM International Conference, Vol. 30, p.:141-148, 2002.
[6] Roth V., “On the Robustness of Some Cryptographic Protocol for Mobile Agent
Protection,” The Second Int. Joint Conference on Autonomous Agents and Multiagent
Systems, Melbourne, Australia, pp.:851-858, 2003.
[7] Acquisti A., William J., Van Hoof R., Scott M., Sierhuis M., “ Brahms Tutorial version
1.00,” 2003.
[8] Grand M., “Java Language Reference,” ISBN: 1-56592-326-x, 450 pages, 1997. World
Academy of Science, Engineering and echnology Vol:2 2008-06-28 566 International
[9] Yarahmadi H., Dehghan M., "A Hybrid Method for Protecting the Integrity of Mobile
Agents," 12th Annual International Computer Society of Iran Computer Conference,
CSICC 2007, Tehran, Iran, PP. 1933-1938, 20-22 Feb. 2007

Thank you for copying data from http://www.arastirmax.com