Security and Trust on Mobile Agent Platforms: A Survey

被引:3
|
作者
Samet, Donies [1 ]
Ktata, Farah Barika [2 ]
Ghedira, Khaled [3 ]
机构
[1] Ecole Natl Sci Informat, Manouba, Tunisia
[2] Inst Super Sci Appl & Technol Sousse, Sousse, Tunisia
[3] Inst Super Gest Tunis, Le Bardo, France
关键词
Mobile agents; Mobile agent platforms; Security criteria; Trust; FRAMEWORK; JADE;
D O I
10.1007/978-3-319-59394-4_5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Mobile agent technologies are known for their capacity to develop and construct distributed, heterogeneous and interoperable systems. Despite the presence of several platforms for the development of mobile agent applications, security issues act as a main deterrent against such trends. Based on this, we conducted a comparative study of the most promising and existing mobile agent platforms, showing the diverse security features employed to address various threats. We investigate also the trust models used by the platforms. The established study focuses on the contributions to verify security criteria by the used security mechanisms in every studied platform. This study is important not only to allow practitioners pick the most suitable platforms to meet their security requirements, but also to allow researchers address the voids by ameliorating the concluded limits and proposing possible improvements of new versions of these platforms.
引用
收藏
页码:42 / 52
页数:11
相关论文
共 50 条
  • [41] A mobile agent security management
    You, EG
    Lee, KS
    18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 360 - 365
  • [42] The research of mobile agent security
    Li, XB
    Zhang, AJ
    Sun, JF
    Yin, ZL
    GRID AND COOPERATIVE COMPUTING, PT 2, 2004, 3033 : 187 - 190
  • [43] Solution to mobile agent security
    Wang, Huifang
    Guo, Zhong
    Huang, Yongzhong
    Guo, Jingeng
    Jisuanji Gongcheng/Computer Engineering, 2002, 28 (01):
  • [44] Countermeasures for mobile agent security
    Jansen, WA
    COMPUTER COMMUNICATIONS, 2000, 23 (17) : 1667 - 1676
  • [45] Security, Trust and Implementation Limitations of Prominent IoT Platforms
    Sathyadevan, Shiju
    Kalarickal, Boney S.
    Jinesh, M. K.
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 2, 2015, 328 : 85 - 95
  • [46] Multi-Mobile Agent Trust Framework for Mitigating Internal Attacks and Augmenting RPL Security
    Farooq, Umer
    Asim, Muhammad
    Tariq, Noshina
    Baker, Thar
    Awad, Ali Ismail
    SENSORS, 2022, 22 (12)
  • [47] Maximizing utility of mobile agent based E-commerce applications with trust enhanced security
    Lin, C
    Varadharajan, V
    Wang, Y
    TRUST, PRIVACY, AND SECURITY IN DIGITAL BUSINESS, 2005, 3592 : 151 - 160
  • [48] Security in the Firefox OS and Tizen Mobile Platforms
    Gadyatskaya, Olga
    Massacci, Fabio
    Zhauniarovich, Yury
    COMPUTER, 2014, 47 (06) : 57 - 63
  • [49] Privacy and Security Issues for Mobile Health Platforms
    Harvey, Melissa J.
    Harvey, Michael G.
    JOURNAL OF THE ASSOCIATION FOR INFORMATION SCIENCE AND TECHNOLOGY, 2014, 65 (07) : 1305 - 1318
  • [50] Survey of security and trust in opportunistic networks
    Wu, Y. (wuyue@sjtu.edu.cn), 2013, Science Press (50):