IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Security in Mobile Agent Systems

Security in Mobile Agent Systems
View Sample PDF
Author(s): Chua Fang Fang (Multimedia University, Malaysia)and G. Radhamani (Multimedia University, Malaysia)
Copyright: 2009
Pages: 14
Source title: Mobile Computing: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): David Taniar (Monash University, Australia)
DOI: 10.4018/978-1-60566-054-7.ch198

Purchase

View Security in Mobile Agent Systems on the publisher's website for pricing and purchasing information.

Abstract

Agent technologies have grown rapidly in recent years as Internet usage has increased tremendously. Despite its numerous practical benefits and promises to provide an efficient way of mitigating complex distributed problems, mobile agent technology still lacks effective security measures, which severely restricts its scope of applicability. This chapter analyzes and synthesizes the different security threats and attacks that can possibly be imposed to mobile agent systems. The security solutions to resolve the problems and the research challenges in this field are presented.

Related Content

Tapan Kumar Behera. © 2023. 20 pages.
B. Narendra Kumar Rao. © 2023. 17 pages.
Blendi Rrustemi, Deti Baholli, Herolind Balaj. © 2023. 18 pages.
Alma Beluli. © 2023. 11 pages.
Jona Ndrecaj, Shkurte Berisha, Erita Çunaku. © 2023. 15 pages.
Yllka Totaj. © 2023. 12 pages.
Hla Myo Tun, Devasis Pradhan. © 2023. 31 pages.
Body Bottom