نتایج جستجو برای: Protection agent

تعداد نتایج: 428050  

2007
Steven Guan

IntroductIon One hindrance to the widespread adoption of mobile agent technology is the lack of security. Security will be the issue that has to be addressed carefully if a mobile agent is to be used in the field of electronic commerce. SAFERor Secure Agent Fabrication, Evolution, and Roamingis a mobile agent framework that is specially designed for the purpose of electronic commerce By build...

2001
Josep Domingo-Ferrer

One approach to secure mobile agent execution is restricting the agent route to trusted environments. A necessary condition for this approach to be practical is that the agent route be protected. Previous proposals for agent route protection either offer low security or suffer from high computational costs due to cryptographic operations. We present two fast, hash-based mechanisms for agent rou...

1999
Torsten Mandry Günther Pernul Alexander W. Röhm

In this paper we characterize the different tasks mobile agents can perform for their users on electronic markets. These tasks imply various risks that have to be addressed by protection mechanisms, not only to protect the market servers from malicious agents, but also to prevent the mobile agents from malicious hosts. To achieve the latter is quite difficult, because in order to execute the ag...

Journal: :Journal of Systems and Software 2002
Tianhan Wang Steven Guan Tai Khoon Chan

The mobile agent paradigm has been proposed as a promising solution to facilitate distributed computing over open and heterogeneous networks. Mobility, autonomy, and intelligence are identified as key features of mobile agent systems and enabling characteristics for the next-generation smart electronic commerce on the Internet. However, security-related issues, especially integrity protection i...

2004
Jeffrey Todd McDonald Alec Yasinsac Willard C. Thompson

Protection of agent data state and partial results in mobile agent systems continues to draw research interest. Current solutions to integrity attacks are geared at detection of malicious activity a posteriori. We propose multi-agent architecture that uses cooperating multi-hop and single-hop agents to prevent such attacks and discuss security features of our scheme. We also examine data protec...

2007
Salima Hacini Zizette Boufaïda Haoua Cheribi

The applications of mobile agent technology are various and include electronic commerce, personal assistance, parallel processing ... The use of mobile agent paradigm provides several advantages. Unfortunately, it has introduced some problems. Security represents an important issue. Current researches efforts in the area of mobile agent security follow two aspects: (i) protection of the hosts f...

2014
Dan Guo

An identity-based anonymous agent privacy protection scheme is proposed to deal with the problems of privacy information disclosure. In this paper, some analysis about the status quo of the privacy protection research in China and some partitioning of privacy data in ecommerce are given. We further illuminate the whole process of privacy protection by an ecommerce privacy protection scheme base...

Journal: :IEEJ Transactions on Power and Energy 1998

2006
Soo-Cheol Kim Sang-Soo Yeo Sung Kwon Kim

Recently many researchers in various fields has noticed RFID system. RFID system has many advantages more than other automatic identification system. However, it has some consumer privacy problems, such as location tracking and disclosure of personal information. Most of related works have focused on the cryptographic scheme for the RFID tag and the reader. In this paper, a proxy agent scheme u...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید