Securing dynamic itineraries for mobile agent applications
نویسندگان
چکیده
منابع مشابه
Securing dynamic itineraries for mobile agent applications
In this paper we present a novel mechanism for the protection of dynamic itineraries for mobile agent applications. Itineraries that are decided as the agent goes are essential in complex applications based on mobile agents, but no approach has been presented until now to protect them. We have conceived a cryptographic scheme for shielding dynamic itineraries from tampering, impersonation and d...
متن کاملVerification of Itineraries for Mobile Agent Enabled Interorganizational Workflow
We apply mobile agents to synchronize workflows of different organizations resulting in an interorganizational workflow. This paper models agent enabled interorganizational workflows using Interorganizational Workflow Nets. This model provides a means to verify the correctness (and, so the viability) of the itineraries of agents used in enacting interorganizational workflows. We also outline an...
متن کاملSecuring Mobile Applications
W idespread mobile device use has stimulated a rich market for applications. Many apps, however, reveal sensitive user information such as location, movements, and habits1 and/or spread malware.2 Network anonymization techniques alone don’t ensure privacy because the OS together with the invoked mobile apps might still release information that reidentifies users or devices. Even when users are ...
متن کاملImproving the dynamism of mobile agent applications in wireless sensor networks through separate itineraries
This paper introduces the deployment of a new type of mobile agent application in wireless sensor networks (WSNs) that implements the construct of separate itinerary, a classic concept from Concordia, a mobile agent system in conventional distributed environments. A separate itinerary is a completely separate data structure from the agent itself, providing a simple mechanism to flexibly define ...
متن کاملDefend mobile agent against malicious hosts in migration itineraries
Agent integrity verification and fault-tolerance are the two prevalent methods among the solutions to the Problem of Malicious Hosts in Mobile agent system. Agent integrity verification enables the owner of the agent to detect upon its return whether a visited host has maliciously altered the state of the agent based on agent integrity verification [6]. A known drawback of such method is that i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Network and Computer Applications
سال: 2008
ISSN: 1084-8045
DOI: 10.1016/j.jnca.2007.12.002