Autonomous Agents 2010
DOI: 10.5772/9656
|View full text |Cite
|
Sign up to set email alerts
|

Security in Large-Scale Open Distributed Multi-Agent Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 42 publications
(31 reference statements)
0
5
0
Order By: Relevance
“…Signed code was suggested in Jansen (2000) as a technique with which agent platforms can detect tampering on agent code or data. Recently, Oey and Brazier (2010) also presented techniques for detecting tampering by malicious platforms on mobile agent code and data. Protecting mobile agent code and data when they visit malicious platforms is a difficult task; however, digital signatures applied by a trusted platform can be used to enforce integrity of agent code and data.…”
Section: Digital Signaturesmentioning
confidence: 99%
“…Signed code was suggested in Jansen (2000) as a technique with which agent platforms can detect tampering on agent code or data. Recently, Oey and Brazier (2010) also presented techniques for detecting tampering by malicious platforms on mobile agent code and data. Protecting mobile agent code and data when they visit malicious platforms is a difficult task; however, digital signatures applied by a trusted platform can be used to enforce integrity of agent code and data.…”
Section: Digital Signaturesmentioning
confidence: 99%
“…The kernel manages a secure communication [Oey et al, 2010b] and acts as an agent container. The AgentScape middleware provides a number of system services such as 'location managers', 'host managers', 'agent servers' and 'service servers'.…”
Section: Figure 25mentioning
confidence: 99%
“…There have been many attempts to protect mobile agents from the host platform in the literature (Jansen and Karygiannis 2000), (Oey, Warnier and Brazier 2010) and (Ngereki 2015); some are based on cryptography while others are not; e.g. code obfuscation (Majumdar and Thomborson 2005), function encryption (Lee, Alves-Foss and Harrison 2004) and (Zhu and Xiang 2011), environmental key generation (Riordan and Schneier 1998), execution tracing (Tan and Moreau 2002), and agent monitoring (Page, Zaslavsky and Indrawan 2005).…”
Section: Related Workmentioning
confidence: 99%