A mobile agent is a software which performs an
action autonomously and independently as a person or an
organizations assistance. Mobile agents are used for searching
information, retrieval information, filtering, intruder recognition in
networks, and so on. One of the important issues of mobile agent is
their security. It must consider different security issues in effective
and secured usage of mobile agent. One of those issues is the
integrity-s protection of mobile agents.
In this paper, the advantages and disadvantages of each method,
after reviewing the existing methods, is examined. Regarding to this
matter that each method has its own advantage or disadvantage, it
seems that by combining these methods, one can reach to a better
method for protecting the integrity of mobile agents. Therefore, this
method is provided in this paper and then is evaluated in terms of
existing method. Finally, this method is simulated and its results are
the sign of improving the possibility of integrity-s protection of
mobile agents.
[1] Martin L. Griss , " Software Agents as Next Generation Software
Components," Component-based Software Engineering: Putting the
Pieces Together, pp.: 641-657.
[2] Borselius N., "Mobile agent security," Electronic & Communication
Engineering Journal, Vol. 14, No. 5, 2002.
[3] Jansen W., "C ountermeasures for Mobile Agent Security," Componentbased
Software Engineering.
[4] Bierman E., Cloete E., "Classification of Malicious Host Threats in
Mobile Agent Computing," ACM International Conference, Vol. 30, pp.:
141-148, 2002.
[5] Roth V., "On the Robustness of Some Cryptographic Protocol for
Mobile Agent Protection," The Second Int. Joint Conference on
Autonomous Agents and Multiagent Systems, Melbourne, Australia, pp.:
851-858, 2003.
[6] Acquisti A., William J., Van Hoof R., Scott M., Sierhuis M., " Brahms
Tutorial version 1.00," 2003.
[7] Grand M., "Java Language Reference," ISBN: 1-56592-326-x, 450
pages, 1997.
[1] Martin L. Griss , " Software Agents as Next Generation Software
Components," Component-based Software Engineering: Putting the
Pieces Together, pp.: 641-657.
[2] Borselius N., "Mobile agent security," Electronic & Communication
Engineering Journal, Vol. 14, No. 5, 2002.
[3] Jansen W., "C ountermeasures for Mobile Agent Security," Componentbased
Software Engineering.
[4] Bierman E., Cloete E., "Classification of Malicious Host Threats in
Mobile Agent Computing," ACM International Conference, Vol. 30, pp.:
141-148, 2002.
[5] Roth V., "On the Robustness of Some Cryptographic Protocol for
Mobile Agent Protection," The Second Int. Joint Conference on
Autonomous Agents and Multiagent Systems, Melbourne, Australia, pp.:
851-858, 2003.
[6] Acquisti A., William J., Van Hoof R., Scott M., Sierhuis M., " Brahms
Tutorial version 1.00," 2003.
[7] Grand M., "Java Language Reference," ISBN: 1-56592-326-x, 450
pages, 1997.
@article{"International Journal of Electrical, Electronic and Communication Sciences:49572", author = "R. Haghighat far and H. Yarahmadi", title = "A New Approach for Mobile Agent Security", abstract = "A mobile agent is a software which performs an
action autonomously and independently as a person or an
organizations assistance. Mobile agents are used for searching
information, retrieval information, filtering, intruder recognition in
networks, and so on. One of the important issues of mobile agent is
their security. It must consider different security issues in effective
and secured usage of mobile agent. One of those issues is the
integrity-s protection of mobile agents.
In this paper, the advantages and disadvantages of each method,
after reviewing the existing methods, is examined. Regarding to this
matter that each method has its own advantage or disadvantage, it
seems that by combining these methods, one can reach to a better
method for protecting the integrity of mobile agents. Therefore, this
method is provided in this paper and then is evaluated in terms of
existing method. Finally, this method is simulated and its results are
the sign of improving the possibility of integrity-s protection of
mobile agents.", keywords = "Integrity, Mobile Agent, Security.", volume = "2", number = "6", pages = "1048-4", }