Security Issues in Mobile Agent Applications
An autonomous mobile agent is an executing program that can migrate from machine to machine in a heterogeneous network under its own control. An agent can either follow a pre-assigned path on the network or determine its itinerary based on the data collected from the network. Facilities for highly d...
Gespeichert in:
Veröffentlicht in: | International journal of agent technologies and systems 2010-10, Vol.2 (4), p.39-55 |
---|---|
1. Verfasser: | |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 55 |
---|---|
container_issue | 4 |
container_start_page | 39 |
container_title | International journal of agent technologies and systems |
container_volume | 2 |
creator | Ojesanmi, O A |
description | An autonomous mobile agent is an executing program that can migrate from machine to machine in a heterogeneous network under its own control. An agent can either follow a pre-assigned path on the network or determine its itinerary based on the data collected from the network. Facilities for highly dynamic movement of code and data enable a program to take advantage of the locality of data. It also allows one to optimize between the requirements of low bandwidth, high latency and disconnected network connections. This computing paradigm, which exploits code, data and state mobility, raises many new security issues that are quite different from conventional client/server systems. Agent servers that provide an execution environment for the agents to execute can be attacked by malicious agents. Similarly agents could be carrying sensitive information about their owners and should be protected from tampering by malicious hosts. The data collected by the agent from one host should also be protected from tampering by another host in the itinerary. In this paper, various security issues that arise in mobile agents applications were examined. |
doi_str_mv | 10.4018/jats.2010100104 |
format | Article |
fullrecord | <record><control><sourceid>gale_cross</sourceid><recordid>TN_cdi_crossref_primary_10_4018_jats_2010100104</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A759718806</galeid><sourcerecordid>A759718806</sourcerecordid><originalsourceid>FETCH-LOGICAL-c2048-1d0d329228d614d06f1e3f88ffa6d83320b59f26d49b733eac14ca98d18afa243</originalsourceid><addsrcrecordid>eNp1kD1PwzAQhi0EEqUws2aDgbT-SmKPUVWgUhEDMFtObAdXaRJyydB_j6sgkBDIJ_uG516dH4SuCV5wTMRypwdYUEzCCcVP0IxIzmKcJfT0u-f8HF0A7DBOOU3kDN292HLs_XCINgCjhcg30VNb-NpGeWWbIcq7rvalHnzbwCU6c7oGe_X1ztHb_fp19Rhvnx82q3wblxRzERODDaOSUmFSwg1OHbHMCeGcTo1gjOIikY6mhssiY8zqkvBSS2GI0E5Tzubodsrt-vYjLDWovYfS1rVubDuCIpgRRjjOREDvJrTStVXFCL6xEC7w1fsAlR4BVJ4lMiNC4DTgywkv-xagt051vd_r_hAy1VGjOmpUPxrDxHqa8JVXu3bsm_BzdTSmJmPKN2oypoKxf2JoyLn5I-cXpjrj2Cddr4jA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1031314078</pqid></control><display><type>article</type><title>Security Issues in Mobile Agent Applications</title><source>Alma/SFX Local Collection</source><creator>Ojesanmi, O A</creator><creatorcontrib>Ojesanmi, O A</creatorcontrib><description>An autonomous mobile agent is an executing program that can migrate from machine to machine in a heterogeneous network under its own control. An agent can either follow a pre-assigned path on the network or determine its itinerary based on the data collected from the network. Facilities for highly dynamic movement of code and data enable a program to take advantage of the locality of data. It also allows one to optimize between the requirements of low bandwidth, high latency and disconnected network connections. This computing paradigm, which exploits code, data and state mobility, raises many new security issues that are quite different from conventional client/server systems. Agent servers that provide an execution environment for the agents to execute can be attacked by malicious agents. Similarly agents could be carrying sensitive information about their owners and should be protected from tampering by malicious hosts. The data collected by the agent from one host should also be protected from tampering by another host in the itinerary. In this paper, various security issues that arise in mobile agents applications were examined.</description><identifier>ISSN: 1943-0744</identifier><identifier>EISSN: 1943-0752</identifier><identifier>DOI: 10.4018/jats.2010100104</identifier><language>eng</language><publisher>IGI Global</publisher><subject>Agents (artificial intelligence) ; Bandwidth ; Computer information security ; Dynamics ; Joints ; Networks ; Security ; Servers</subject><ispartof>International journal of agent technologies and systems, 2010-10, Vol.2 (4), p.39-55</ispartof><rights>COPYRIGHT 2010 IGI Global</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c2048-1d0d329228d614d06f1e3f88ffa6d83320b59f26d49b733eac14ca98d18afa243</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Ojesanmi, O A</creatorcontrib><title>Security Issues in Mobile Agent Applications</title><title>International journal of agent technologies and systems</title><description>An autonomous mobile agent is an executing program that can migrate from machine to machine in a heterogeneous network under its own control. An agent can either follow a pre-assigned path on the network or determine its itinerary based on the data collected from the network. Facilities for highly dynamic movement of code and data enable a program to take advantage of the locality of data. It also allows one to optimize between the requirements of low bandwidth, high latency and disconnected network connections. This computing paradigm, which exploits code, data and state mobility, raises many new security issues that are quite different from conventional client/server systems. Agent servers that provide an execution environment for the agents to execute can be attacked by malicious agents. Similarly agents could be carrying sensitive information about their owners and should be protected from tampering by malicious hosts. The data collected by the agent from one host should also be protected from tampering by another host in the itinerary. In this paper, various security issues that arise in mobile agents applications were examined.</description><subject>Agents (artificial intelligence)</subject><subject>Bandwidth</subject><subject>Computer information security</subject><subject>Dynamics</subject><subject>Joints</subject><subject>Networks</subject><subject>Security</subject><subject>Servers</subject><issn>1943-0744</issn><issn>1943-0752</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2010</creationdate><recordtype>article</recordtype><sourceid>N95</sourceid><recordid>eNp1kD1PwzAQhi0EEqUws2aDgbT-SmKPUVWgUhEDMFtObAdXaRJyydB_j6sgkBDIJ_uG516dH4SuCV5wTMRypwdYUEzCCcVP0IxIzmKcJfT0u-f8HF0A7DBOOU3kDN292HLs_XCINgCjhcg30VNb-NpGeWWbIcq7rvalHnzbwCU6c7oGe_X1ztHb_fp19Rhvnx82q3wblxRzERODDaOSUmFSwg1OHbHMCeGcTo1gjOIikY6mhssiY8zqkvBSS2GI0E5Tzubodsrt-vYjLDWovYfS1rVubDuCIpgRRjjOREDvJrTStVXFCL6xEC7w1fsAlR4BVJ4lMiNC4DTgywkv-xagt051vd_r_hAy1VGjOmpUPxrDxHqa8JVXu3bsm_BzdTSmJmPKN2oypoKxf2JoyLn5I-cXpjrj2Cddr4jA</recordid><startdate>20101001</startdate><enddate>20101001</enddate><creator>Ojesanmi, O A</creator><general>IGI Global</general><scope>AAYXX</scope><scope>CITATION</scope><scope>N95</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20101001</creationdate><title>Security Issues in Mobile Agent Applications</title><author>Ojesanmi, O A</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c2048-1d0d329228d614d06f1e3f88ffa6d83320b59f26d49b733eac14ca98d18afa243</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Agents (artificial intelligence)</topic><topic>Bandwidth</topic><topic>Computer information security</topic><topic>Dynamics</topic><topic>Joints</topic><topic>Networks</topic><topic>Security</topic><topic>Servers</topic><toplevel>online_resources</toplevel><creatorcontrib>Ojesanmi, O A</creatorcontrib><collection>CrossRef</collection><collection>Gale Business: Insights</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>International journal of agent technologies and systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Ojesanmi, O A</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Security Issues in Mobile Agent Applications</atitle><jtitle>International journal of agent technologies and systems</jtitle><date>2010-10-01</date><risdate>2010</risdate><volume>2</volume><issue>4</issue><spage>39</spage><epage>55</epage><pages>39-55</pages><issn>1943-0744</issn><eissn>1943-0752</eissn><abstract>An autonomous mobile agent is an executing program that can migrate from machine to machine in a heterogeneous network under its own control. An agent can either follow a pre-assigned path on the network or determine its itinerary based on the data collected from the network. Facilities for highly dynamic movement of code and data enable a program to take advantage of the locality of data. It also allows one to optimize between the requirements of low bandwidth, high latency and disconnected network connections. This computing paradigm, which exploits code, data and state mobility, raises many new security issues that are quite different from conventional client/server systems. Agent servers that provide an execution environment for the agents to execute can be attacked by malicious agents. Similarly agents could be carrying sensitive information about their owners and should be protected from tampering by malicious hosts. The data collected by the agent from one host should also be protected from tampering by another host in the itinerary. In this paper, various security issues that arise in mobile agents applications were examined.</abstract><pub>IGI Global</pub><doi>10.4018/jats.2010100104</doi><tpages>17</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1943-0744 |
ispartof | International journal of agent technologies and systems, 2010-10, Vol.2 (4), p.39-55 |
issn | 1943-0744 1943-0752 |
language | eng |
recordid | cdi_crossref_primary_10_4018_jats_2010100104 |
source | Alma/SFX Local Collection |
subjects | Agents (artificial intelligence) Bandwidth Computer information security Dynamics Joints Networks Security Servers |
title | Security Issues in Mobile Agent Applications |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-21T08%3A01%3A08IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Security%20Issues%20in%20Mobile%20Agent%20Applications&rft.jtitle=International%20journal%20of%20agent%20technologies%20and%20systems&rft.au=Ojesanmi,%20O%20A&rft.date=2010-10-01&rft.volume=2&rft.issue=4&rft.spage=39&rft.epage=55&rft.pages=39-55&rft.issn=1943-0744&rft.eissn=1943-0752&rft_id=info:doi/10.4018/jats.2010100104&rft_dat=%3Cgale_cross%3EA759718806%3C/gale_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1031314078&rft_id=info:pmid/&rft_galeid=A759718806&rfr_iscdi=true |