2007
DOI: 10.1007/978-3-540-73549-6_117
|View full text |Cite
|
Sign up to set email alerts
|

Towards Secure Agent Computing for Ubiquitous Computing and Ambient Intelligence

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
12
0

Year Published

2009
2009
2011
2011

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 19 publications
(12 citation statements)
references
References 7 publications
0
12
0
Order By: Relevance
“…The reason for this happen is that the protection of mobile agents against the attacks of malicious hosts is considered the most difficult security problem to solve in mobile agents systems. Indeed, in [18] is shown how scientific community has put many efforts in this field, many applications exist based on this technology. However, all this efforts are wasted due to the lack of a secure and robust basis to build applications based on agent technology.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The reason for this happen is that the protection of mobile agents against the attacks of malicious hosts is considered the most difficult security problem to solve in mobile agents systems. Indeed, in [18] is shown how scientific community has put many efforts in this field, many applications exist based on this technology. However, all this efforts are wasted due to the lack of a secure and robust basis to build applications based on agent technology.…”
Section: Introductionmentioning
confidence: 99%
“…In [18] two different solutions are presented to provide a secure framework for agent based applications development. The first of these consists on a standalone software solution, which makes use of the entitled approach 'protected computing' [10].…”
Section: Introductionmentioning
confidence: 99%
“…This paper focuses on multiagent systems and the security within them. More specifically, our work deals with static mutual security schemes [7] and is organized as follows: in Section 2 we review related publications and we introduce the MAS (multiagent system), mobile agents, JADE platform, and security schemes. Section 3 presents the application of the protected computing approach in the agent protection.…”
Section: Introductionmentioning
confidence: 99%
“…Scientific community has devoted important efforts to this field [4]. Indeed, many current applications exist based on this technology.…”
Section: Introductionmentioning
confidence: 99%
“…In Reference [4] two different solutions to provide agent protection are introduced. Firstly, a software-based solution built on the protected computing approach, based on the previous work of Maña [5].…”
Section: Introductionmentioning
confidence: 99%