Secure Recording of Itineraries through Co-operating Agents
نویسنده
چکیده
Security is a fundamental precondition for the acceptance of mobile agent systems. In this paper we discuss protocols to improve agent security by distributing critical data and operations on mutually supporting agents which migrate in disjunct host domains. In order to attack agents, hosts must form coalitions. Proper selection of itineraries can minimize the risk of such coalitions being formed.
منابع مشابه
Mutual Protection of Co-operating Agents
Security is a fundamental precondition for the acceptance of mobile agent systems. In this paper we discuss protocols to improve agent security by distributing critical data and operations on mutually supporting agents which migrate in disjunct host domains. In order to attack agents, hosts must collude/conspire across domains. Proper selection of itineraries can minimize the risk of such coali...
متن کاملPodcast Distribution on Disconnected Areas
We consider a realistic podcast distribution application in remote rural areas, where programs have to be recorded into a CD and distributed to the local radio stations. We use a store-carry-and-forward approach, based on mobile agents, that is designed to operate in areas that lack network infrastructure. PrivHab is a georouting protocol that learns the mobility habits of the nodes of the netw...
متن کاملAn M-Commerce Environment Based on Software Agents
This paper presents the E _-C_ommerce through W_ ireless dE _vices (E-CWE) project that uses software agents in the design and development of an m-commerce environment. Users of the E-CWE environment are able to use their wireless devices, such as mobile phones, to undertake e-commerce transactions. Conducting these transactions raises new issues that vary from the limited bandwidth of networks...
متن کاملDistributed Authorization Framework for Mobile Agents
Mobile agent systems provide new perspectives for distributed e-commerce applications. These applications may present specific restrictions, making mobile agent systems a feasible solution. Even so, mobile agents present some security related problems. An important one is resource access control. The ability for mobile agents to provide a simple, scalable, flexible, and secure access control sy...
متن کاملThe Assyrian Itineraries in the Zagros during the reign of Sargon II (6th and 8th campaigns) and the question about the correlation between Toponymy and Geography
Among the many Assyrian written sources and inscriptions some texts report the military expeditions of the kings of Assyria. These accounts, the so-called Itineraries texts, describe in details the different stops of the armies through territories outside the Assyrian heartland. With regard to the Zagros area, the reports mention different long and ruthless campaigns undertaken by some Assyrian...
متن کامل