Empowering Mobile Software Agents

نویسنده

  • Volker Roth
چکیده

Recent work has shown that several cryptographic protocols for the protection of free-roaming mobile agents are vulnerable by means of protocol interleaving attacks. This paper presents equivalent protocols meant to be robust against this type of attack. Moreover, it describes the required processes and data structures at a level of detail that can be translated to an implementation in a straightforward way. Our aim is to demonstrate how cryptographic processing can be implemented transparently for agent programmers, thereby reducing the risks of human error in (secure) mobile agent programming.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An aspect-oriented software architecture for code mobility

Mobile agents have come forward as a technique for tackling the complexity of open distributed applications. However, the pervasive nature of code mobility implies that it cannot be modularized using only object-oriented (OO) concepts. In fact, developers frequently evidence the presence of mobility tangling and scattering in their modules. Despite these problems, they usually rely on OO applic...

متن کامل

Empowering educators with Google's Android App Inventor: An online workshop in mobile app design

Introduction Mobile devices such as smartphones are vastly gaining popularity (Johnson, Levine, Smith, & Stone, 2010) due to their relatively strong computing capability built into small sizes, their Internet connectivity, and the availability of various types and easy-to-use mobile software applications (" mobile apps "). It is estimated that by 2015, 80% of people accessing the Internet will ...

متن کامل

ارائه یک رویکرد همانند سازی شده عامل محور در اجرای یک الگوی کد متحرک مطمئن

Abstract Using mobile agents, it is possible to bring the code close to the resources, which is not foreseen by the traditional client/server paradigm. Compared to the client/server computing paradigm, the greater flexibility of the mobile agent paradigm comes at additional costs as well as the additional complexity of developing and managing mobile agent-based applications. Such complexity ...

متن کامل

Mobile Agents for Active Network Management

Traditionally, network management systems have been based on client/server technologies comprised of distributed static agents (servers) and a centralized manager (client). The behavior of such systems has proven to be difficult to modify and/or extend. The use of mobile software agents has been introduced as an alternative to traditional centralized network management techniques. Mobile softwa...

متن کامل

Speech Adaptation in Extended Ambient Intelligence Environments

This Blue Sky presentation focuses on a major shift toward a notion of “ambient intelligence” that transcends general applications targeted at the general population. The focus is on highly personalized agents that accommodate individual differences and changes over time. This notion of Extended Ambient Intelligence (EAI) concerns adaptation to a person’s preferences and exp...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002