{"title":"Applications of mobile agents and related security issues","authors":"M. Ketel","doi":"10.1109/SECON.2007.342847","DOIUrl":null,"url":null,"abstract":"The mobile agent (MA) paradigm with its properties of autonomy, asynchronicity, and local resource exploitation suits the needs of many distributed applications. The typical applications for MAs include information retrieval, e-commerce, mobile computing, and network management. However, there are many security issues associated with this technology. In this paper, we give an overview of MA and their applications, and discuss the security vulnerabilities at both the agent level and host/agent server level.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"43 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings 2007 IEEE SoutheastCon","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SECON.2007.342847","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The mobile agent (MA) paradigm with its properties of autonomy, asynchronicity, and local resource exploitation suits the needs of many distributed applications. The typical applications for MAs include information retrieval, e-commerce, mobile computing, and network management. However, there are many security issues associated with this technology. In this paper, we give an overview of MA and their applications, and discuss the security vulnerabilities at both the agent level and host/agent server level.