New approaches for distributed computing based on mobile agent technology, such as Java, Telescript, or Agent Tcl become ever more pervasive. Typical applications of mobile agents in the domain of electronic commerce are agents that roam the Internet in search of services for their owners. The question of how to protect agent platforms from malicious agents is extensively being tackled. The reverse problem of how to protect mobile agents and the potentially confidential information they contain from malicious platforms is largely ignored.
CITATION STYLE
Wilhelm, U. G., Staamann, S., & Buttyán, L. (1998). Protecting the itinerary of mobile agents. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1543, p. 301). Springer Verlag. https://doi.org/10.1007/3-540-49255-0_79
Mendeley helps you to discover research relevant for your work.