Securing Mobile-Agent Systems through Collaboration

Securing Mobile-Agent Systems through Collaboration

Mohammed Hussain, David B. Skillicorn
Copyright: © 2010 |Pages: 27
ISBN13: 9781605664149|ISBN10: 1605664146|EISBN13: 9781605664156
DOI: 10.4018/978-1-60566-414-9.ch008
Cite Chapter Cite Chapter

MLA

Hussain, Mohammed, and David B. Skillicorn. "Securing Mobile-Agent Systems through Collaboration." Collaborative Computer Security and Trust Management, edited by Jean-Marc Seigneur and Adam Slagell, IGI Global, 2010, pp. 154-180. https://doi.org/10.4018/978-1-60566-414-9.ch008

APA

Hussain, M. & Skillicorn, D. B. (2010). Securing Mobile-Agent Systems through Collaboration. In J. Seigneur & A. Slagell (Eds.), Collaborative Computer Security and Trust Management (pp. 154-180). IGI Global. https://doi.org/10.4018/978-1-60566-414-9.ch008

Chicago

Hussain, Mohammed, and David B. Skillicorn. "Securing Mobile-Agent Systems through Collaboration." In Collaborative Computer Security and Trust Management, edited by Jean-Marc Seigneur and Adam Slagell, 154-180. Hershey, PA: IGI Global, 2010. https://doi.org/10.4018/978-1-60566-414-9.ch008

Export Reference

Mendeley
Favorite

Abstract

Mobile agents are self-contained programs that migrate among computing devices to achieve tasks on behalf of users. Autonomous and mobile agents make it easier to develop complex distributed systems. Many applications can benefit greatly from employing mobile agents, especially e-commerce. For instance, mobile agents can travel from one e-shop to another, collecting offers based on customers’ preferences. Mobile agents have been used to develop systems for telecommunication networks, monitoring, information retrieval, and parallel computing. Characteristics of mobile agents, however, introduce new security issues which require carefully designed solutions. On the one hand, malicious agents may violate privacy, attack integrity, and monopolize hosts’ resources. On the other hand, malicious hosts may manipulate agents’ memory, return wrong results from system calls, and deny access to necessary resources. This has motivated research focused on devising techniques to address the security of mobile-agent systems. This chapter surveys the techniques securing mobile-agent systems. The survey categorizes the techniques based on the degree of collaboration used to achieve security. This categorization resembles the difference between this chapter and other surveys in the literature where categorization is on the basis of entities/ parts protected and underlying methodologies used for protection. This survey shows the importance of collaboration in enhancing security and discusses its implications and challenges.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.