A survey on distributed mobile agents' system security
نویسندگان
چکیده
منابع مشابه
Distributed Security Algorithms by Mobile Agents
Mobile Agents have been extensively studied for several years by researchers in Artificial Intelligence and in Software Engineering. They offer a simple and natural way to describe distributed settings where mobility is inherent, and an explicit and direct way to describe the entities of those settings, such as mobile code, software agents, viruses, robots, web crawlers, etc. Further, they allo...
متن کاملDistributed Security Algorithms for Mobile Agents
Mobile agents have been extensively studied for several years by researchers in artificial intelligence and in software engineering. They offer a simple and natural way to describe distributed settings where mobility is inherent and an explicit and direct way to describe the entities of those settings, such as mobile code, software agents, viruses, robots, and Web crawlers. Further, they allow ...
متن کاملDistributed Intrusion Detection System using Mobile Agents
The increasing number of network security related incidents makes it necessary for organizations to actively protect their sensitive data with the installation of intrusion detection systems (IDS). Autonomous software agents, especially when equipped with mobility, promise an interesting design approach for such applications. We evaluate the implications of applying mobile agent technology to t...
متن کاملA Survey on Mobile Payment Systems Security
In recent years, increasing use of mobile devices and the emergence of new technologies have changed mobile commerce and mobile payment in all over the world. Although many attempts have been made to implement secure mobile payment systems and services, growing forgery, fraud and other related electronic crimes as well as security attacks and threats prove the necessity of paying special attent...
متن کاملMobile Agents and Security
Mobile agent technology offers a new computing paradigm in which a software agent can suspend its execution on a host computer, transfer itself to another agent-enabled host on the network, and resume execution on the new host. The use of mobile code has a long history dating back to the use of remote job entry systems in the 1960's. Today's agent incarnations can be characterized in a number o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Knowledge Engineering and Soft Data Paradigms
سال: 2020
ISSN: 1755-3210,1755-3229
DOI: 10.1504/ijkesdp.2020.112617