{"title":"移动代理安全问题概述-解决方案","authors":"S. Sobitha Ahila, K. L. Shunmuganathan","doi":"10.1109/ICICES.2014.7033808","DOIUrl":null,"url":null,"abstract":"Mobile agent systems are an active area of research with many issues still to be addressed before they achieve practical widespread use. Mobile agent is a mobile object that moves from host to host under the control of its own will to achieve task. Mobile agents are mainly intended to be used for applications distributed over large-scale networks since they permit reduction in communication costs by moving computation part to the host on which the target data resides. This paper gives an overview of the main security issues related to the mobile agent paradigm. These issues include security threats, requirements, and techniques for keeping the mobile agent platform and the agent itself secure against each other.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"32 1","pages":"1-6"},"PeriodicalIF":0.0000,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"Overview of mobile agent security issues — Solutions\",\"authors\":\"S. Sobitha Ahila, K. L. Shunmuganathan\",\"doi\":\"10.1109/ICICES.2014.7033808\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Mobile agent systems are an active area of research with many issues still to be addressed before they achieve practical widespread use. Mobile agent is a mobile object that moves from host to host under the control of its own will to achieve task. Mobile agents are mainly intended to be used for applications distributed over large-scale networks since they permit reduction in communication costs by moving computation part to the host on which the target data resides. This paper gives an overview of the main security issues related to the mobile agent paradigm. These issues include security threats, requirements, and techniques for keeping the mobile agent platform and the agent itself secure against each other.\",\"PeriodicalId\":13713,\"journal\":{\"name\":\"International Conference on Information Communication and Embedded Systems (ICICES2014)\",\"volume\":\"32 1\",\"pages\":\"1-6\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Conference on Information Communication and Embedded Systems (ICICES2014)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICICES.2014.7033808\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Information Communication and Embedded Systems (ICICES2014)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICES.2014.7033808","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Overview of mobile agent security issues — Solutions
Mobile agent systems are an active area of research with many issues still to be addressed before they achieve practical widespread use. Mobile agent is a mobile object that moves from host to host under the control of its own will to achieve task. Mobile agents are mainly intended to be used for applications distributed over large-scale networks since they permit reduction in communication costs by moving computation part to the host on which the target data resides. This paper gives an overview of the main security issues related to the mobile agent paradigm. These issues include security threats, requirements, and techniques for keeping the mobile agent platform and the agent itself secure against each other.