{"title":"移动代理的应用及相关安全问题","authors":"M. Ketel","doi":"10.1109/SECON.2007.342847","DOIUrl":null,"url":null,"abstract":"The mobile agent (MA) paradigm with its properties of autonomy, asynchronicity, and local resource exploitation suits the needs of many distributed applications. The typical applications for MAs include information retrieval, e-commerce, mobile computing, and network management. However, there are many security issues associated with this technology. In this paper, we give an overview of MA and their applications, and discuss the security vulnerabilities at both the agent level and host/agent server level.","PeriodicalId":423683,"journal":{"name":"Proceedings 2007 IEEE SoutheastCon","volume":"43 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Applications of mobile agents and related security issues\",\"authors\":\"M. Ketel\",\"doi\":\"10.1109/SECON.2007.342847\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The mobile agent (MA) paradigm with its properties of autonomy, asynchronicity, and local resource exploitation suits the needs of many distributed applications. The typical applications for MAs include information retrieval, e-commerce, mobile computing, and network management. However, there are many security issues associated with this technology. In this paper, we give an overview of MA and their applications, and discuss the security vulnerabilities at both the agent level and host/agent server level.\",\"PeriodicalId\":423683,\"journal\":{\"name\":\"Proceedings 2007 IEEE SoutheastCon\",\"volume\":\"43 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-03-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings 2007 IEEE SoutheastCon\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SECON.2007.342847\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings 2007 IEEE SoutheastCon","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SECON.2007.342847","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Applications of mobile agents and related security issues
The mobile agent (MA) paradigm with its properties of autonomy, asynchronicity, and local resource exploitation suits the needs of many distributed applications. The typical applications for MAs include information retrieval, e-commerce, mobile computing, and network management. However, there are many security issues associated with this technology. In this paper, we give an overview of MA and their applications, and discuss the security vulnerabilities at both the agent level and host/agent server level.