Editorial: Mobile agent systems

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Agent Pattern for Mobile Agent Systems

This paper presents the Agent pattern, a design pattern useful to develop dynamic and distributed applications. The Agent pattern provides a clean and easy way to develop agent-based applications, mainly in open and large-scale distributed environments such as the Internet and application areas such as Electronic Commerce. The Agent pattern encapsulates a business specific class (a specializati...

متن کامل

Agent Groups in Mobile Agent Systems

One of the key arguments for mobile agent systems is the flexible usage of groups of agents. However, none of the existing mobile agent systems supports agent groups. In this paper we introduce our model of agent groups in mobile agent environments. Various entities of an agent group are consecutively identified and their roles within an electronic market scenario thoroughly pictured. We argue ...

متن کامل

Modeling Secure Mobile Agent Systems

We propose a MDA based approach for designing secure mobile agent systems. First, we define a meta-model which extends the UML deployment diagram by concepts related to the security and mobility of multi-agent systems. We propose also a UML profile as an implementation of this meta-model. Second, we project the application model into AGLETS-specific model, which describes the main functionaliti...

متن کامل

Trust in Mobile Agent Systems

The protection of mobile agent systems continues to be an active area of research that will enable future applications to utilize this paradigm of computing. Agent systems and mobile applications must balance security requirements with available security mechanisms in order to meet application level security goals. We pose models for viewing security in application contexts that aid the mobile ...

متن کامل

Security in Mobile Agent Systems

There are four possible security attacks: Attacks from host to host, from agents to hosts, from agents to agents and finally from hosts to agents. Our main concern in this paper is attacks from a malicious host on an agent. These attacks can take many forms including rerouting, spying out code, spying out data, spying out control flow, manipulation of code, manipulation of data, manipulation of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Software: Practice and Experience

سال: 2002

ISSN: 0038-0644,1097-024X

DOI: 10.1002/spe.446