Please use this identifier to cite or link to this item: http://dspace.hebron.edu:8080/xmlui/handle/123456789/42
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAmro, Belal-
dc.date.accessioned2019-07-15T15:40:56Z-
dc.date.available2019-07-15T15:40:56Z-
dc.date.issued2014-03-
dc.identifier.issn1694-0784-
dc.identifier.urihttp://dspace.hebron.edu:80/xmlui/handle/123456789/42-
dc.description.abstractMobile agent technology offers a dramatically evolving computing paradigm in which a program, in the form of a software agent, can suspend its execution on a host computer, transfers itself to another agent-enabled host on the network, and resumes execution on the new host. It is 1960's since mobile code has been used in the form of remote job entry systems. Today's mobile agents can be characterized in a number of ways ranging from simple distributed objects to highly organized intelligent softwares. As a result of this rapid evolvement of mobile agents, plenty of critical security issues has risen and plenty of work is being done to address these problems. The aim is to provide trusted mobile agent systems that can be easily deployed and widely adopted. In this paper, we provide an overview of the most recent threats facing the designers of agent platforms and the developers of agent-based applications. The paper also identifies security objectives, and measures for countering the identified threats and fulfilling those security objectives.en_US
dc.language.isoenen_US
dc.publisherIJCSI International Journal of Computer Science Issuesen_US
dc.subjectMobile agenten_US
dc.subjectagent platformsen_US
dc.subjectSecurity threatsen_US
dc.subjectAttacksen_US
dc.titleMobile Agent Systems, Recent Security Threats and Counter Measuresen_US
dc.typeArticleen_US
Appears in Collections:Journals

Files in This Item:
File Description SizeFormat 
Mobile agent systems IJCSI.pdf577.91 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.