D. R., Adang Suhendra, Addien Febrinata, Anne Yuliyanti
{"title":"Secure Mobile Agent System in Peer-to-Peer Networks: A Review of Security Mechanisms Based on Several Security Issues","authors":"D. R., Adang Suhendra, Addien Febrinata, Anne Yuliyanti","doi":"10.1109/WCSE.2009.426","DOIUrl":null,"url":null,"abstract":"Peer-to-peer(P2P) technology can be naturally integrated with mobile agent technology in Internet applications, taking advantage of the autonomy, mobility, and efficiency of mobile agents in accessing, processing event securing data. In P2P, giving permission to client who could accessed data is needed to reduced client’s worrying of prevent any stealing private data. Under this assumption, in this paper, we address the problem of protecting mobile agent system in P2P networks. Some approaches of security mechanisms and techniques are then discussed.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"65 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 WRI World Congress on Software Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WCSE.2009.426","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Peer-to-peer(P2P) technology can be naturally integrated with mobile agent technology in Internet applications, taking advantage of the autonomy, mobility, and efficiency of mobile agents in accessing, processing event securing data. In P2P, giving permission to client who could accessed data is needed to reduced client’s worrying of prevent any stealing private data. Under this assumption, in this paper, we address the problem of protecting mobile agent system in P2P networks. Some approaches of security mechanisms and techniques are then discussed.