

Integrating Security Model for Introducing Advanced Security in Mobile Agents
Abstract
Keywords
References
A. Corradi, R. Montanari,” Security Issues in mobile agents Technology”, IEEE Internet Computing, Vol. 1, 1999.
T. Taka Tadanori, M. Takashi Watanabe,” A Model of mobile agents Services Enhanced for Resource Restrictions and Security”, IEEE Internet Computing, 1995.
H. Lee, ”The Use of Encrypted Functions for mobile agent Security”, Proceedings of the 37th Hawaii International Conference on System Sciences, 2004.
T. Sander, C. Tschudin, “Protecting mobile agents Against Malicious Hosts”, In G. Vigna, editor, mobile agent Security, pages 44–60. Springer Verlag: Heidelberg, 1998.
B. Yee, ”Using Secure Coprocessors”, PhD thesis, Carnegie Mellon University, 1994.
X. D. Guan, Y. L. Yang, and J. Y. You, “POM - A Security Model against Malicious Hosts”, DCTC Tech Report, IEEE Computer Society, Shanghai Jiaotong Univ. Dec. 2000.
N. Karnik, “Security in mobile agent Systems” PhD Thesis, Department of Computer Science and Engineering, University of Minnesota, 1998.
L. D'Anna, B. Matt, A. Reisse, T. Van Vleck, S. Schwab, and P. LeBlanc, "Self- Protecting mobile agents Obfuscation Report", Network Associates Laboratories, June 2003.
A. Young, M. Yung, "Encryption Tools for mobile agents: Sliding Encryption," In: E. BIHAM (ed), Fast Software Encryption, Springer-Verlag, Germany, 1997.
G. Karjoth, J. Posegga, "Mobile agents and Telcos' Nightmares," Annales des Telecommunications VoL 55, No. 7/8, 29-41, 2000.
G. Vigna, "Protecting mobile agents Through Tracing," Proceedings of the 3rd ECOOP Workshop on Mobile Object Systems, Jyvalskylä, Finland, June 1997.
J. Riordan, B. Schneier, “Environmental Key Generation Towards Clueless Agents,” G. Vinga (Ed.), Mobile agents and Security, Springer-Verlag, Lecture Notes in Computer Science No. 1419, 1998.
Yan Li, Min Fu, Lina Yu, “E-Commerce Security Model Construction Based on Mobile Agent”, IEEE International Conference on Networking and Digital Society, 2010.
V. Roth, "Secure Recording of Itineraries Through Cooperating Agents," Proceedings of the ECOOP Workshop on Distributed Object Security and 4th Workshop on Mobile Object Systems: Secure Internet Mobile Computations, pp. 147-154, INRIA, France, 1998.
B. Yee, "A Sanctuary for mobile agents," DARPA Workshop on Foundations for Secure Mobile Code, Feb. 1997.
G. Karjoth, N. Asokan, and C. Glc, "Protecting the Computation Results of Free- Roaming Agents", Second International Workshop on mobile agents, Stuttgart, Germany, Sep. 1998.
G. Wroblewski, "General Method of Program Code Obfuscation", PhD Dissertation, Wroclaw University of Technology, Institute of Engineering Cybernetics, 2002.
F. Hohl, "Time Limited Blackbox Security: Protecting mobile agents from Malicious Hosts," To appear in mobile agents and Security Book edited by Giovanni Vigna, published by Springer Verlag 1998.
B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, and K. Yang, "On the (Im)possibility of Obfuscating Programs," in Advances in Cryptology, Proceedings of Crypto'2001, Lecture Notes in Computer Science, Vol. 2139, pages 1-18.
G. Hachez, "A Comparative Study of Software Protection Tools Suited for Ecommerce with Contributions to Software Watermarking and Smart Cards," Universite Catholique de Louvain, 2003.
C. Collberg, C. Thomborson, and D. Low, "A taxonomy of obfuscating transformations," Technical Report 148, Department of Computer Science, University of Auckland, July 1997.
W. Jansen, T. Karygiannis, "Mobile agent Security," NIST Special Publication 800-19, National Institute of Standard and Technology, 2000.
Wayne A. Jansen, “Countermeasures for Mobile Agent Security” March 01, 2010.
S. Armoogum, A. Caully,” Obfuscation Techniques for Mobile Agent code confidentiality”, March 2010.
S. Srivastava, G.C Nandi, ” Detection of Mobile Agent’s blocking in Secure Layered Architecture”, IEEE International Conference on Communication Systems and Network Technologies, 2011.
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.