skip to main content
article
Free Access

Protecting the integrity of agents: an exploration into letting agents loose in an unpredictable world

Published:01 June 1999Publication History
First page image

References

  1. 1 Byrne, C. and Edwards P. Refinement in Agent Groups. Technical Report, Department of Computer Science, King's College, University of Aberden, Aberdeen, Scotland, UK, 1996.]]Google ScholarGoogle ScholarCross RefCross Ref
  2. 2 Chess D., Grosof B., Harrison C., Levine D. and Parris, C. Itinerant Agents for Mobile Computing. Technical Report RC 20010, IBM, March 1995.]]Google ScholarGoogle ScholarCross RefCross Ref
  3. 3 d'Inverno M., Luck M. and Wooldridge, M. Cooperation Structures. In Proceedings of the 5th International Joint Conference on Artificial Intelligence (1997, Nagoya, Japan) pp. 600-605.]]Google ScholarGoogle Scholar
  4. 4 Hohl, F. An Approach to Solve the Problem of Malicious Hosts. Institute of Parallel and Distributed High-Performance Systems (IPVR), Fakultat Informatik Universitat Stuttgart Breitwiesenstr, March 1997.]]Google ScholarGoogle Scholar
  5. 5 Hohl, F. Protecting Mobile Agents with Blackbox Security. Workshop on Mobile Agents and Security (October 1997) University of Maryland.]]Google ScholarGoogle Scholar
  6. 6 Jennings, N.R. and Wooldridge, M. Applications of Intelligent Agents. In N. Jennings and M.J. Wooldridge (eds.), Agent Technology: Foundations, Applications, and Markets. Springer-Verlag. pp. 3-28, 1998.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7 Meadows, C. Detecting Attacks on Mobile Agents. Foundations for Secure Mobile Code Workshop, Center for High Assurance Computing Systems, 1997.]]Google ScholarGoogle Scholar
  8. 8 Morris, W. (eds.). The American Heritage Dictionary. Houghton Mifflin Co., Boston, 1976.]]Google ScholarGoogle Scholar
  9. 9 Ndumu, D. and Nwana, H. Research and Development Challenges for Agent-Based Systems. In IEEE/BCS Software Engineering Journal (1996).]]Google ScholarGoogle Scholar
  10. 10 Nwana, H., Lee, L. and Jennings, N. Coordination in Software Agent Systems. BT Technology Journal. 14(4), 1996.]]Google ScholarGoogle Scholar
  11. 11 Ordille, J. When Agents Roam, Who Can You Trust?. Innovations for Lucent Technologies, Computing Science Research Center, Bell Labs, 1996.]]Google ScholarGoogle Scholar
  12. 12 Sander, T. and Tschudin, C. Protecting Mobile Agents Against Malicious Hosts. Lecture Notes in Computer Science: "Mobile Agents and Security". G. Vigna (Ed.) Springer Berlin Heidelberg (June 18, 1998).]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. 13 Swarup, V., Farmer, W. and Guttman, J. Security for Mobile Agents: Issues and Requirements. Proceedings of the National Information Systems Security Conference (NISSC), October 1996.]]Google ScholarGoogle Scholar

Index Terms

  1. Protecting the integrity of agents: an exploration into letting agents loose in an unpredictable world

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in

                Full Access

                • Published in

                  cover image XRDS: Crossroads, The ACM Magazine for Students
                  XRDS: Crossroads, The ACM Magazine for Students  Volume 5, Issue 4
                  June 1999
                  55 pages
                  ISSN:1528-4972
                  EISSN:1528-4980
                  DOI:10.1145/331648
                  Issue’s Table of Contents

                  Copyright © 1999 ACM

                  Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                  Publisher

                  Association for Computing Machinery

                  New York, NY, United States

                  Publication History

                  • Published: 1 June 1999

                  Permissions

                  Request permissions about this article.

                  Request Permissions

                  Check for updates

                  Qualifiers

                  • article

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader

                HTML Format

                View this article in HTML Format .

                View HTML Format