Evaluation of Authentication Mechanisms for Mobile Agents on top of Java

@article{Ismail2007EvaluationOA,
  title={Evaluation of Authentication Mechanisms for Mobile Agents on top of Java},
  author={Leila Ismail},
  journal={6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007)},
  year={2007},
  pages={663-668}
}
This paper presents an evaluation of authentication mechanisms for mobile agents on top of a Java environment. In these mechanisms, the authentication of mobile agents is controlled by the mobile-agents platform using digital signature and a Public Key Infrastructure. An evaluation of these mechanisms has been conducted. The measurements give the cost of the basic mechanisms involved in the implementation of authentication mechanisms integrated within a mobile-agent based platform. A prototype… CONTINUE READING

Figures, Tables, and Topics from this paper.

Citations

Publications citing this paper.
SHOWING 1-6 OF 6 CITATIONS

References

Publications referenced by this paper.
SHOWING 1-10 OF 19 REFERENCES

JDK 5.0 Documentation

  • Sun Microsystems
  • Sun Microsystems,
  • 2004
Highly Influential
9 Excerpts

Agent Tcl. Itinerant Agents: Explanations and Examples with CDROM

  • Robert S. Gray, George Cybenko, David Kotz, Daniela Rus
  • William Cockayne and Michael Zypa (editors),
  • 1997
Highly Influential
4 Excerpts

Cryptography and Network Security, Third Edition

  • W. Stalling
  • Upper Saddle River, NJ: Prentice Hall
  • 2003
2 Excerpts

Jalali-Sohi. "Access Control and Key Management for Mobile Agents

  • Volker Roth, Mehrdad
  • Elevier Preprint,
  • 2001
1 Excerpt

Similar Papers

Loading similar papers…