- 1 Byrne, C. and Edwards P. Refinement in Agent Groups. Technical Report, Department of Computer Science, King's College, University of Aberden, Aberdeen, Scotland, UK, 1996.]]Google ScholarCross Ref
- 2 Chess D., Grosof B., Harrison C., Levine D. and Parris, C. Itinerant Agents for Mobile Computing. Technical Report RC 20010, IBM, March 1995.]]Google ScholarCross Ref
- 3 d'Inverno M., Luck M. and Wooldridge, M. Cooperation Structures. In Proceedings of the 5th International Joint Conference on Artificial Intelligence (1997, Nagoya, Japan) pp. 600-605.]]Google Scholar
- 4 Hohl, F. An Approach to Solve the Problem of Malicious Hosts. Institute of Parallel and Distributed High-Performance Systems (IPVR), Fakultat Informatik Universitat Stuttgart Breitwiesenstr, March 1997.]]Google Scholar
- 5 Hohl, F. Protecting Mobile Agents with Blackbox Security. Workshop on Mobile Agents and Security (October 1997) University of Maryland.]]Google Scholar
- 6 Jennings, N.R. and Wooldridge, M. Applications of Intelligent Agents. In N. Jennings and M.J. Wooldridge (eds.), Agent Technology: Foundations, Applications, and Markets. Springer-Verlag. pp. 3-28, 1998.]] Google ScholarDigital Library
- 7 Meadows, C. Detecting Attacks on Mobile Agents. Foundations for Secure Mobile Code Workshop, Center for High Assurance Computing Systems, 1997.]]Google Scholar
- 8 Morris, W. (eds.). The American Heritage Dictionary. Houghton Mifflin Co., Boston, 1976.]]Google Scholar
- 9 Ndumu, D. and Nwana, H. Research and Development Challenges for Agent-Based Systems. In IEEE/BCS Software Engineering Journal (1996).]]Google Scholar
- 10 Nwana, H., Lee, L. and Jennings, N. Coordination in Software Agent Systems. BT Technology Journal. 14(4), 1996.]]Google Scholar
- 11 Ordille, J. When Agents Roam, Who Can You Trust?. Innovations for Lucent Technologies, Computing Science Research Center, Bell Labs, 1996.]]Google Scholar
- 12 Sander, T. and Tschudin, C. Protecting Mobile Agents Against Malicious Hosts. Lecture Notes in Computer Science: "Mobile Agents and Security". G. Vigna (Ed.) Springer Berlin Heidelberg (June 18, 1998).]] Google ScholarDigital Library
- 13 Swarup, V., Farmer, W. and Guttman, J. Security for Mobile Agents: Issues and Requirements. Proceedings of the National Information Systems Security Conference (NISSC), October 1996.]]Google Scholar
Index Terms
- Protecting the integrity of agents: an exploration into letting agents loose in an unpredictable world
Recommendations
A hybrid method for protecting the integrity of mobile agents
TELE-INFO'08: Proceedings of the 7th WSEAS International Conference on Telecommunications and InformaticsA mobile agent is a computer program which performs an action autonomously and independently on behalf of a person or an organization. Mobile agents are used for searching information, retrieval applications, filtering, detecting errors, intrusion ...
Protecting mobile agents from external replay attacks
This paper presents a protocol for the protection of mobile agents against external replay attacks. This kind of attacks are performed by malicious platforms when dispatching an agent multiple times to a remote host, thus making it reexecute part of its ...
Programming norm-aware agents
AAMAS '12: Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems - Volume 2Normative organisations provide a means to coordinate the activities of individual agents in multiagent settings. The coordination is realized at run time by creating obligations and prohibitions (norms) for individual agents. If an agent cannot meet an ...
Comments