Classification of malicious host threats in mobile agent computing

@inproceedings{Bierman2002ClassificationOM,
  title={Classification of malicious host threats in mobile agent computing},
  author={Elmarie Bierman and E. Cloete},
  year={2002}
}
Full-scale adoption of mobile agent technology in untrustworthy network environments, such as the Internet, has been delayed by several security complexities [Montanari, 2001]. Presently, there is a large array of security issues and sub-issues within mobile agent computing that makes it tough to distinguish between different types of problems, and therefore also interfere with the definition of suitable solutions. Literature addressing the full range of problems is limited and mostly discusses… CONTINUE READING

Topics from this paper.

Citations

Publications citing this paper.
SHOWING 1-10 OF 73 CITATIONS

A review of attacks and security approaches in open multi-agent systems

  • Artificial Intelligence Review
  • 2012
VIEW 5 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

MOC via TOC Using a Mobile Agent Framework

VIEW 3 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

An Implementation of Efficient Hierarchical Access Control Method for VR/AR Platform

  • 2018 16th International Conference on Emerging eLearning Technologies and Applications (ICETA)
  • 2018
VIEW 1 EXCERPT
CITES METHODS

FILTER CITATIONS BY YEAR

2003
2019

CITATION STATISTICS

  • 6 Highly Influenced Citations