منابع مشابه
The Agent Pattern for Mobile Agent Systems
This paper presents the Agent pattern, a design pattern useful to develop dynamic and distributed applications. The Agent pattern provides a clean and easy way to develop agent-based applications, mainly in open and large-scale distributed environments such as the Internet and application areas such as Electronic Commerce. The Agent pattern encapsulates a business specific class (a specializati...
متن کاملAgent Groups in Mobile Agent Systems
One of the key arguments for mobile agent systems is the flexible usage of groups of agents. However, none of the existing mobile agent systems supports agent groups. In this paper we introduce our model of agent groups in mobile agent environments. Various entities of an agent group are consecutively identified and their roles within an electronic market scenario thoroughly pictured. We argue ...
متن کاملModeling Secure Mobile Agent Systems
We propose a MDA based approach for designing secure mobile agent systems. First, we define a meta-model which extends the UML deployment diagram by concepts related to the security and mobility of multi-agent systems. We propose also a UML profile as an implementation of this meta-model. Second, we project the application model into AGLETS-specific model, which describes the main functionaliti...
متن کاملTrust in Mobile Agent Systems
The protection of mobile agent systems continues to be an active area of research that will enable future applications to utilize this paradigm of computing. Agent systems and mobile applications must balance security requirements with available security mechanisms in order to meet application level security goals. We pose models for viewing security in application contexts that aid the mobile ...
متن کاملSecurity in Mobile Agent Systems
There are four possible security attacks: Attacks from host to host, from agents to hosts, from agents to agents and finally from hosts to agents. Our main concern in this paper is attacks from a malicious host on an agent. These attacks can take many forms including rerouting, spying out code, spying out data, spying out control flow, manipulation of code, manipulation of data, manipulation of...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Software: Practice and Experience
سال: 2002
ISSN: 0038-0644,1097-024X
DOI: 10.1002/spe.446