IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Security in Mobile Agent Systems

Security in Mobile Agent Systems
View Sample PDF
Author(s): Chua Fang Fang (Multimedia University, Malaysia)and G. Radhamani (Multimedia University, Malaysia)
Copyright: 2009
Pages: 14
Source title: Electronic Business: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): In Lee (Western Illinois University, USA)
DOI: 10.4018/978-1-60566-056-1.ch054

Purchase

View Security in Mobile Agent Systems on the publisher's website for pricing and purchasing information.

Abstract

Agent technologies have grown rapidly in recent years as Internet usage has increased tremendously. Despite its numerous practical benefits and promises to provide an efficient way of mitigating complex distributed problems, mobile agent technology still lacks effective security measures, which severely restricts its scope of applicability. This chapter analyzes and synthesizes the different security threats and attacks that can possibly be imposed to mobile agent systems. The security solutions to resolve the problems and the research challenges in this field are presented.

Related Content

Emrah Arğın. © 2022. 16 pages.
Ebru Gülbuğ Erol, Mustafa Gülsün. © 2022. 17 pages.
Yeşim Şener. © 2022. 18 pages.
Salim Kurnaz, Deimantė Žilinskienė. © 2022. 20 pages.
Dorothea Maria Bowyer, Walid El Hamad, Ciorstan Smark, Greg Evan Jones, Claire Beattie, Ying Deng. © 2022. 29 pages.
Savas S. Ates, Vildan Durmaz. © 2022. 24 pages.
Nusret Erceylan, Gaye Atilla. © 2022. 20 pages.
Body Bottom