Protecting the itinerary of mobile agents

3Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

New approaches for distributed computing based on mobile agent technology, such as Java, Telescript, or Agent Tcl become ever more pervasive. Typical applications of mobile agents in the domain of electronic commerce are agents that roam the Internet in search of services for their owners. The question of how to protect agent platforms from malicious agents is extensively being tackled. The reverse problem of how to protect mobile agents and the potentially confidential information they contain from malicious platforms is largely ignored.

Cite

CITATION STYLE

APA

Wilhelm, U. G., Staamann, S., & Buttyán, L. (1998). Protecting the itinerary of mobile agents. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1543, p. 301). Springer Verlag. https://doi.org/10.1007/3-540-49255-0_79

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free