Showing items 1 - 13 of 13.
Add to Quick Collection
All 13 Results
- First
- Previous
- 1
- Next
- Last
Add All Items to Quick Collection
Date: 2010
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/146763
Description:
While offering many practical benefits for distributed applications, mobile agent systems pose some fundamental security challenges. In this paper, we present a new approach to mobile agent security w
... More
Reviewed:
Date: 2007
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/26066
Description:
We propose a hybrid trust model for enhancing security in distributed applications by combining the "hard" and "soft" trust relationships. The motivation is to compensate for the drawbacks associated
... More
Full Text:
Reviewed:
Date: 2006
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/18049
Description:
Security measures alone are not sufficient for counteracting malicious behaviors in distributed systems. The new trend is to use economical models (mainly game-theoretic models) to characterize such m
... More
Full Text:
Reviewed:
Date: 2006
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/18297
Description:
The mobile agent computing model violates some of the fundamental assumptions of conventional security techniques. Consequently, this has rendered many of the existing conventional security countermea
... More
Full Text:
Reviewed:
Date: 2005
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1229830
Description:
4 page(s)
Reviewed:
Date: 2005
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/149610
Description:
Utility has become an important consideration for information security. In this paper, we show that decisions by security mechanisms, such as the authorization decisions in a mobile agent based e-comm
... More
Reviewed:
Date: 2005
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1166144
Description:
9 page(s)
Reviewed:
Date: 2005
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/145162
Description:
This paper presents a new approach for mobile agent security - trust enhanced security and develops mobile trust - a novel trust management architecture to support the trust enhanced security solution
... More
Reviewed:
Date: 2004
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1231398
Description:
8 page(s)
Reviewed:
Date: 2004
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1245081
Description:
10 page(s)
Reviewed:
Date: 2003
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1245079
Description:
15 page(s)
Reviewed:
Date: 2003
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1175932
Description:
5 page(s)
Date: 2003
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1163149
Description:
8 page(s)
Reviewed:
- First
- Previous
- 1
- Next
- Last