Secure Mobile Agents with Controlled Resources
Mobile agents often travel in a hostile environment where their security and privacy could be compromised by any party including remote hosts in which agents visit and get services. It is believed that the host visited by an agent should jointly sign a service agreement with the agent's owner;...
Saved in:
Main Authors: | ZHANG, Qi, Mu, Yi, ZHANG, Minjie, DENG, Robert H. |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2011
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/1307 http://dx.doi.org/10.1002/cpe.1618 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Secure Mobile Agents with Designated Hosts
by: ZHANG, Qi, et al.
Published: (2009) -
Applying mobile agents technology to intrusion detection and response
by: CHEW WAI MENG
Published: (2010) -
Defending against redirect attacks in mobile IP
by: DENG, Robert H., et al.
Published: (2002) -
Designing leakage-resilient password entry on touchscreen mobile devices
by: YAN, Qiang, et al.
Published: (2013) -
Secure agent transport and integrity protection
by: YANG YANG
Published: (2010)