Securing dynamic itineraries for mobile agent applications

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing dynamic itineraries for mobile agent applications

In this paper we present a novel mechanism for the protection of dynamic itineraries for mobile agent applications. Itineraries that are decided as the agent goes are essential in complex applications based on mobile agents, but no approach has been presented until now to protect them. We have conceived a cryptographic scheme for shielding dynamic itineraries from tampering, impersonation and d...

متن کامل

Verification of Itineraries for Mobile Agent Enabled Interorganizational Workflow

We apply mobile agents to synchronize workflows of different organizations resulting in an interorganizational workflow. This paper models agent enabled interorganizational workflows using Interorganizational Workflow Nets. This model provides a means to verify the correctness (and, so the viability) of the itineraries of agents used in enacting interorganizational workflows. We also outline an...

متن کامل

Securing Mobile Applications

W idespread mobile device use has stimulated a rich market for applications. Many apps, however, reveal sensitive user information such as location, movements, and habits1 and/or spread malware.2 Network anonymization techniques alone don’t ensure privacy because the OS together with the invoked mobile apps might still release information that reidentifies users or devices. Even when users are ...

متن کامل

Improving the dynamism of mobile agent applications in wireless sensor networks through separate itineraries

This paper introduces the deployment of a new type of mobile agent application in wireless sensor networks (WSNs) that implements the construct of separate itinerary, a classic concept from Concordia, a mobile agent system in conventional distributed environments. A separate itinerary is a completely separate data structure from the agent itself, providing a simple mechanism to flexibly define ...

متن کامل

Defend mobile agent against malicious hosts in migration itineraries

Agent integrity verification and fault-tolerance are the two prevalent methods among the solutions to the Problem of Malicious Hosts in Mobile agent system. Agent integrity verification enables the owner of the agent to detect upon its return whether a visited host has maliciously altered the state of the agent based on agent integrity verification [6]. A known drawback of such method is that i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Network and Computer Applications

سال: 2008

ISSN: 1084-8045

DOI: 10.1016/j.jnca.2007.12.002