{"title":"移动代理和平台的安全:保护代码和保护其完整性","authors":"M. R. Karim","doi":"10.4172/2165-7866.1000220","DOIUrl":null,"url":null,"abstract":"At present, mobile agent technology is an important research area for researcher to develop its new features, confirming its security and usability. Mobile agent is a program, which can be act in a computer network in order to perform some activities on behalf of a human user or an application. In this paper, we describe an overview of the security issues related to the mobile agent paradigm. Then we look in some existing security standards and technologies for mobile agent to analysis their goals that are keeping platform of security against a malicious mobile agent. Finally, we introduce a new framework for improvement of mobile agent security in order to secure the code and protect its integrity.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"189 1","pages":"1-3"},"PeriodicalIF":0.0000,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2165-7866.1000220","citationCount":"8","resultStr":"{\"title\":\"Security for Mobile Agents and Platforms: Securing the Code and Protecting its Integrity\",\"authors\":\"M. R. Karim\",\"doi\":\"10.4172/2165-7866.1000220\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"At present, mobile agent technology is an important research area for researcher to develop its new features, confirming its security and usability. Mobile agent is a program, which can be act in a computer network in order to perform some activities on behalf of a human user or an application. In this paper, we describe an overview of the security issues related to the mobile agent paradigm. Then we look in some existing security standards and technologies for mobile agent to analysis their goals that are keeping platform of security against a malicious mobile agent. Finally, we introduce a new framework for improvement of mobile agent security in order to secure the code and protect its integrity.\",\"PeriodicalId\":91908,\"journal\":{\"name\":\"Journal of information technology & software engineering\",\"volume\":\"189 1\",\"pages\":\"1-3\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://sci-hub-pdf.com/10.4172/2165-7866.1000220\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of information technology & software engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4172/2165-7866.1000220\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of information technology & software engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4172/2165-7866.1000220","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security for Mobile Agents and Platforms: Securing the Code and Protecting its Integrity
At present, mobile agent technology is an important research area for researcher to develop its new features, confirming its security and usability. Mobile agent is a program, which can be act in a computer network in order to perform some activities on behalf of a human user or an application. In this paper, we describe an overview of the security issues related to the mobile agent paradigm. Then we look in some existing security standards and technologies for mobile agent to analysis their goals that are keeping platform of security against a malicious mobile agent. Finally, we introduce a new framework for improvement of mobile agent security in order to secure the code and protect its integrity.