Evaluation of Authentication Mechanisms for Mobile Agents on top of Java

@article{Ismail2007EvaluationOA,
  title={Evaluation of Authentication Mechanisms for Mobile Agents on top of Java},
  author={Leila Ismail},
  journal={6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007)},
  year={2007},
  pages={663-668}
}
This paper presents an evaluation of authentication mechanisms for mobile agents on top of a Java environment. In these mechanisms, the authentication of mobile agents is controlled by the mobile-agents platform using digital signature and a Public Key Infrastructure. An evaluation of these mechanisms has been conducted. The measurements give the cost of the basic mechanisms involved in the implementation of authentication mechanisms integrated within a mobile-agent based platform. A prototype… CONTINUE READING

Figures, Tables, and Topics from this paper.

Citations

Publications citing this paper.
SHOWING 1-6 OF 6 CITATIONS

A new architecture for digital copyright protection system based on mobile agent

  • 2008 3rd IEEE Conference on Industrial Electronics and Applications
  • 2008
VIEW 10 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

An Authenticated Paradigm for Mobile Agent System in Online Examination

  • 2009 International Conference on Computer Engineering and Technology
  • 2009

A Secure Mobile Agents Platform

VIEW 1 EXCERPT
CITES BACKGROUND

Application of Digital Watermark and Mobile Agent in Copyright Protection System

  • 2008 International Conference on Computer Science and Information Technology
  • 2008
VIEW 1 EXCERPT
CITES BACKGROUND

Key Distribution Framework for a Mobile Agent Platform

  • 2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies
  • 2008
VIEW 1 EXCERPT

References

Publications referenced by this paper.
SHOWING 1-10 OF 20 REFERENCES

JDK 5.0 Documentation

Sun Microsystems
  • Sun Microsystems,
  • 2004
VIEW 9 EXCERPTS
HIGHLY INFLUENTIAL

Mobile agents for secure electronic commerce transactions with privacy protection of the customers

  • 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service
  • 2005
VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL

Agent Tcl. Itinerant Agents: Explanations and Examples with CDROM

Robert S. Gray, George Cybenko, David Kotz, Daniela Rus
  • William Cockayne and Michael Zypa (editors),
  • 1997
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Cryptography and Network Security, Third Edition

W. Stalling
  • Upper Saddle River, NJ: Prentice Hall
  • 2003
VIEW 2 EXCERPTS

Protecting Mobile Code in the Wild

  • IEEE Internet Computing
  • 2003
VIEW 1 EXCERPT

Jalali-Sohi. "Access Control and Key Management for Mobile Agents

Volker Roth, Mehrdad
  • Elevier Preprint,
  • 2001
VIEW 1 EXCERPT