Security Issues in Mobile Agent Applications

An autonomous mobile agent is an executing program that can migrate from machine to machine in a heterogeneous network under its own control. An agent can either follow a pre-assigned path on the network or determine its itinerary based on the data collected from the network. Facilities for highly d...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of agent technologies and systems 2010-10, Vol.2 (4), p.39-55
1. Verfasser: Ojesanmi, O A
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 55
container_issue 4
container_start_page 39
container_title International journal of agent technologies and systems
container_volume 2
creator Ojesanmi, O A
description An autonomous mobile agent is an executing program that can migrate from machine to machine in a heterogeneous network under its own control. An agent can either follow a pre-assigned path on the network or determine its itinerary based on the data collected from the network. Facilities for highly dynamic movement of code and data enable a program to take advantage of the locality of data. It also allows one to optimize between the requirements of low bandwidth, high latency and disconnected network connections. This computing paradigm, which exploits code, data and state mobility, raises many new security issues that are quite different from conventional client/server systems. Agent servers that provide an execution environment for the agents to execute can be attacked by malicious agents. Similarly agents could be carrying sensitive information about their owners and should be protected from tampering by malicious hosts. The data collected by the agent from one host should also be protected from tampering by another host in the itinerary. In this paper, various security issues that arise in mobile agents applications were examined.
doi_str_mv 10.4018/jats.2010100104
format Article
fullrecord <record><control><sourceid>gale_cross</sourceid><recordid>TN_cdi_crossref_primary_10_4018_jats_2010100104</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A759718806</galeid><sourcerecordid>A759718806</sourcerecordid><originalsourceid>FETCH-LOGICAL-c2048-1d0d329228d614d06f1e3f88ffa6d83320b59f26d49b733eac14ca98d18afa243</originalsourceid><addsrcrecordid>eNp1kD1PwzAQhi0EEqUws2aDgbT-SmKPUVWgUhEDMFtObAdXaRJyydB_j6sgkBDIJ_uG516dH4SuCV5wTMRypwdYUEzCCcVP0IxIzmKcJfT0u-f8HF0A7DBOOU3kDN292HLs_XCINgCjhcg30VNb-NpGeWWbIcq7rvalHnzbwCU6c7oGe_X1ztHb_fp19Rhvnx82q3wblxRzERODDaOSUmFSwg1OHbHMCeGcTo1gjOIikY6mhssiY8zqkvBSS2GI0E5Tzubodsrt-vYjLDWovYfS1rVubDuCIpgRRjjOREDvJrTStVXFCL6xEC7w1fsAlR4BVJ4lMiNC4DTgywkv-xagt051vd_r_hAy1VGjOmpUPxrDxHqa8JVXu3bsm_BzdTSmJmPKN2oypoKxf2JoyLn5I-cXpjrj2Cddr4jA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1031314078</pqid></control><display><type>article</type><title>Security Issues in Mobile Agent Applications</title><source>Alma/SFX Local Collection</source><creator>Ojesanmi, O A</creator><creatorcontrib>Ojesanmi, O A</creatorcontrib><description>An autonomous mobile agent is an executing program that can migrate from machine to machine in a heterogeneous network under its own control. An agent can either follow a pre-assigned path on the network or determine its itinerary based on the data collected from the network. Facilities for highly dynamic movement of code and data enable a program to take advantage of the locality of data. It also allows one to optimize between the requirements of low bandwidth, high latency and disconnected network connections. This computing paradigm, which exploits code, data and state mobility, raises many new security issues that are quite different from conventional client/server systems. Agent servers that provide an execution environment for the agents to execute can be attacked by malicious agents. Similarly agents could be carrying sensitive information about their owners and should be protected from tampering by malicious hosts. The data collected by the agent from one host should also be protected from tampering by another host in the itinerary. In this paper, various security issues that arise in mobile agents applications were examined.</description><identifier>ISSN: 1943-0744</identifier><identifier>EISSN: 1943-0752</identifier><identifier>DOI: 10.4018/jats.2010100104</identifier><language>eng</language><publisher>IGI Global</publisher><subject>Agents (artificial intelligence) ; Bandwidth ; Computer information security ; Dynamics ; Joints ; Networks ; Security ; Servers</subject><ispartof>International journal of agent technologies and systems, 2010-10, Vol.2 (4), p.39-55</ispartof><rights>COPYRIGHT 2010 IGI Global</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c2048-1d0d329228d614d06f1e3f88ffa6d83320b59f26d49b733eac14ca98d18afa243</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Ojesanmi, O A</creatorcontrib><title>Security Issues in Mobile Agent Applications</title><title>International journal of agent technologies and systems</title><description>An autonomous mobile agent is an executing program that can migrate from machine to machine in a heterogeneous network under its own control. An agent can either follow a pre-assigned path on the network or determine its itinerary based on the data collected from the network. Facilities for highly dynamic movement of code and data enable a program to take advantage of the locality of data. It also allows one to optimize between the requirements of low bandwidth, high latency and disconnected network connections. This computing paradigm, which exploits code, data and state mobility, raises many new security issues that are quite different from conventional client/server systems. Agent servers that provide an execution environment for the agents to execute can be attacked by malicious agents. Similarly agents could be carrying sensitive information about their owners and should be protected from tampering by malicious hosts. The data collected by the agent from one host should also be protected from tampering by another host in the itinerary. In this paper, various security issues that arise in mobile agents applications were examined.</description><subject>Agents (artificial intelligence)</subject><subject>Bandwidth</subject><subject>Computer information security</subject><subject>Dynamics</subject><subject>Joints</subject><subject>Networks</subject><subject>Security</subject><subject>Servers</subject><issn>1943-0744</issn><issn>1943-0752</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2010</creationdate><recordtype>article</recordtype><sourceid>N95</sourceid><recordid>eNp1kD1PwzAQhi0EEqUws2aDgbT-SmKPUVWgUhEDMFtObAdXaRJyydB_j6sgkBDIJ_uG516dH4SuCV5wTMRypwdYUEzCCcVP0IxIzmKcJfT0u-f8HF0A7DBOOU3kDN292HLs_XCINgCjhcg30VNb-NpGeWWbIcq7rvalHnzbwCU6c7oGe_X1ztHb_fp19Rhvnx82q3wblxRzERODDaOSUmFSwg1OHbHMCeGcTo1gjOIikY6mhssiY8zqkvBSS2GI0E5Tzubodsrt-vYjLDWovYfS1rVubDuCIpgRRjjOREDvJrTStVXFCL6xEC7w1fsAlR4BVJ4lMiNC4DTgywkv-xagt051vd_r_hAy1VGjOmpUPxrDxHqa8JVXu3bsm_BzdTSmJmPKN2oypoKxf2JoyLn5I-cXpjrj2Cddr4jA</recordid><startdate>20101001</startdate><enddate>20101001</enddate><creator>Ojesanmi, O A</creator><general>IGI Global</general><scope>AAYXX</scope><scope>CITATION</scope><scope>N95</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20101001</creationdate><title>Security Issues in Mobile Agent Applications</title><author>Ojesanmi, O A</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c2048-1d0d329228d614d06f1e3f88ffa6d83320b59f26d49b733eac14ca98d18afa243</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Agents (artificial intelligence)</topic><topic>Bandwidth</topic><topic>Computer information security</topic><topic>Dynamics</topic><topic>Joints</topic><topic>Networks</topic><topic>Security</topic><topic>Servers</topic><toplevel>online_resources</toplevel><creatorcontrib>Ojesanmi, O A</creatorcontrib><collection>CrossRef</collection><collection>Gale Business: Insights</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>International journal of agent technologies and systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Ojesanmi, O A</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Security Issues in Mobile Agent Applications</atitle><jtitle>International journal of agent technologies and systems</jtitle><date>2010-10-01</date><risdate>2010</risdate><volume>2</volume><issue>4</issue><spage>39</spage><epage>55</epage><pages>39-55</pages><issn>1943-0744</issn><eissn>1943-0752</eissn><abstract>An autonomous mobile agent is an executing program that can migrate from machine to machine in a heterogeneous network under its own control. An agent can either follow a pre-assigned path on the network or determine its itinerary based on the data collected from the network. Facilities for highly dynamic movement of code and data enable a program to take advantage of the locality of data. It also allows one to optimize between the requirements of low bandwidth, high latency and disconnected network connections. This computing paradigm, which exploits code, data and state mobility, raises many new security issues that are quite different from conventional client/server systems. Agent servers that provide an execution environment for the agents to execute can be attacked by malicious agents. Similarly agents could be carrying sensitive information about their owners and should be protected from tampering by malicious hosts. The data collected by the agent from one host should also be protected from tampering by another host in the itinerary. In this paper, various security issues that arise in mobile agents applications were examined.</abstract><pub>IGI Global</pub><doi>10.4018/jats.2010100104</doi><tpages>17</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1943-0744
ispartof International journal of agent technologies and systems, 2010-10, Vol.2 (4), p.39-55
issn 1943-0744
1943-0752
language eng
recordid cdi_crossref_primary_10_4018_jats_2010100104
source Alma/SFX Local Collection
subjects Agents (artificial intelligence)
Bandwidth
Computer information security
Dynamics
Joints
Networks
Security
Servers
title Security Issues in Mobile Agent Applications
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-21T08%3A01%3A08IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Security%20Issues%20in%20Mobile%20Agent%20Applications&rft.jtitle=International%20journal%20of%20agent%20technologies%20and%20systems&rft.au=Ojesanmi,%20O%20A&rft.date=2010-10-01&rft.volume=2&rft.issue=4&rft.spage=39&rft.epage=55&rft.pages=39-55&rft.issn=1943-0744&rft.eissn=1943-0752&rft_id=info:doi/10.4018/jats.2010100104&rft_dat=%3Cgale_cross%3EA759718806%3C/gale_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1031314078&rft_id=info:pmid/&rft_galeid=A759718806&rfr_iscdi=true