Countermeasures for mobile agent security

  title={Countermeasures for mobile agent security},
  author={Wayne A. Jansen},
  journal={Computer Communications},
Security is an important issue for the widespread deployment of applications based on software agent technology. It is generally agreed that without the proper countermeasures in place, use of agent-based applications will be severely impeded. However, not all applications require the same set of countermeasures, nor can they depend entirely on the agent system to provide them. Instead, countermeasures are applied commensurate with the anticipated threat profile and intended security objectives… CONTINUE READING
Highly Influential
This paper has highly influenced 10 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 196 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.


Publications citing this paper.
Showing 1-10 of 122 extracted citations

Mobile Agents System Security: A Systematic Survey

ACM Comput. Surv. • 2017
View 4 Excerpts
Highly Influenced

Mobile Agent Security against Malicious Platforms

Cybernetics and Systems • 2010
View 13 Excerpts
Highly Influenced

An Overview on Mobile Code Security

View 5 Excerpts
Highly Influenced

An Inside Attacker Proof Intrusion Detection System

2009 Fourth International Conference on Computer Sciences and Convergence Information Technology • 2009
View 6 Excerpts
Highly Influenced

Security of Mobile Agent-Based Web Applications

2008 IEEE Asia-Pacific Services Computing Conference • 2008
View 3 Excerpts
Highly Influenced

197 Citations

Citations per Year
Semantic Scholar estimates that this publication has 197 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 31 references

A sanctuary for mobile agents

Secure Internet Programming • 1999
View 8 Excerpts
Highly Influenced

A Security Model for Aglets

Mobile Agents and Security • 1998
View 4 Excerpts
Highly Influenced

When Agents Roam, Who Can You Trust

J. J. Ordille
Pro ceedings of the First Conference on Emerging Technologies and Applications in Communications, • 1996
View 4 Excerpts
Highly Influenced

Itinerant Agents for Mobile Computing

D. Chess et ali
IEEE Personal Communications, • 1995
View 5 Excerpts
Highly Influenced

Java Security Architecture (JDK 1.2), Draft Document, revision

L. Gong
Sun Microsystems, • 1998
View 1 Excerpt

Programming and Deploying Java Mobile Agents with Aglets

D. B. Lange, M. Oshima
Addison-Wesley • 1998
View 3 Excerpts

Similar Papers

Loading similar papers…