Endre søk
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
MagicNET: Security architecture for discovery and adoption of mobile agents
KTH, Skolan för informations- och kommunikationsteknik (ICT), Data- och systemvetenskap, DSV. NUST, Islamabad, Pakistan .
KTH, Skolan för informations- och kommunikationsteknik (ICT), Data- och systemvetenskap, DSV.
2010 (engelsk)Inngår i: 2009 Proceedings of the 1st International Workshop on Security and Communication Networks, IWSCN 2009, 2010, s. 5683056-Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

Current research in the area of security for mobile agents deals mainly with the runtime issues of agents' protection. Mobile agent systems do not address precisely the process of acquiring mobile agents by their owners, but they assume that the agents are somehow already available for use. This assumption is acceptable for experimental or prototyping environments, but it is inadequate for the real world scenarios where agents should be trusted and reliable, but agent creators and agent owners are separated and manage agents from mutually remote locations. Thus, the issue of agents' adoption for use in serious, sensitive and business networks is very important if agents are used in real-life applications. In this paper we describe the architecture and procedures for secure, verifiable and authenticated discovery and adoption of mobile agents. The main contribution is that in this process agent's code and its functionality can be verified, so that such agents can be deployed in serious applications and scenarios.

sted, utgiver, år, opplag, sider
2010. s. 5683056-
Emneord [en]
Business networks, Mobile agent system, Prototyping, Real-life applications, Real-world scenario, Remote location, Runtimes, Security Architecture, Network architecture, Security of data, Telecommunication networks, Mobile agents
HSV kategori
Identifikatorer
URN: urn:nbn:se:kth:diva-150001Scopus ID: 2-s2.0-79851502679ISBN: 978-829971051-0 (tryckt)OAI: oai:DiVA.org:kth-150001DiVA, id: diva2:743548
Konferanse
2009 1st International Workshop on Security and Communication Networks, IWSCN 2009, 20 May 2009 through 22 May 2009, Trondheim, Norway
Merknad

QC 20140904

Tilgjengelig fra: 2014-09-04 Laget: 2014-08-29 Sist oppdatert: 2014-09-04bibliografisk kontrollert

Open Access i DiVA

Fulltekst mangler i DiVA

Scopus

Søk i DiVA

Av forfatter/redaktør
Shibli, Muhammad AwaisMuftic, Sead
Av organisasjonen

Søk utenfor DiVA

GoogleGoogle Scholar

isbn
urn-nbn

Altmetric

isbn
urn-nbn
Totalt: 15 treff
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf