Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
MagicNET: Security architecture for discovery and adoption of mobile agents
KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV. NUST, Islamabad, Pakistan .
KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
2010 (English)In: 2009 Proceedings of the 1st International Workshop on Security and Communication Networks, IWSCN 2009, 2010, 5683056- p.Conference paper, Published paper (Refereed)
Abstract [en]

Current research in the area of security for mobile agents deals mainly with the runtime issues of agents' protection. Mobile agent systems do not address precisely the process of acquiring mobile agents by their owners, but they assume that the agents are somehow already available for use. This assumption is acceptable for experimental or prototyping environments, but it is inadequate for the real world scenarios where agents should be trusted and reliable, but agent creators and agent owners are separated and manage agents from mutually remote locations. Thus, the issue of agents' adoption for use in serious, sensitive and business networks is very important if agents are used in real-life applications. In this paper we describe the architecture and procedures for secure, verifiable and authenticated discovery and adoption of mobile agents. The main contribution is that in this process agent's code and its functionality can be verified, so that such agents can be deployed in serious applications and scenarios.

Place, publisher, year, edition, pages
2010. 5683056- p.
Keyword [en]
Business networks, Mobile agent system, Prototyping, Real-life applications, Real-world scenario, Remote location, Runtimes, Security Architecture, Network architecture, Security of data, Telecommunication networks, Mobile agents
National Category
Communication Systems
Identifiers
URN: urn:nbn:se:kth:diva-150001Scopus ID: 2-s2.0-79851502679ISBN: 978-829971051-0 (print)OAI: oai:DiVA.org:kth-150001DiVA: diva2:743548
Conference
2009 1st International Workshop on Security and Communication Networks, IWSCN 2009, 20 May 2009 through 22 May 2009, Trondheim, Norway
Note

QC 20140904

Available from: 2014-09-04 Created: 2014-08-29 Last updated: 2014-09-04Bibliographically approved

Open Access in DiVA

No full text

Scopus

Search in DiVA

By author/editor
Shibli, Muhammad AwaisMuftic, Sead
By organisation
Computer and Systems Sciences, DSV
Communication Systems

Search outside of DiVA

GoogleGoogle Scholar

isbn
urn-nbn

Altmetric score

isbn
urn-nbn
Total: 11 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf