Mobile Agents System Security

A pivotal cause for the boom of Mobile Agent paradigm relies on the competence to ward off security attacks. This article surveys the prevalent attacks on the mobile agents and the agent platforms; the existing countermeasures and their curbs, catering threefold benefaction: First, to acquaint the researchers with numerous security requirements and the objectives. Second, to analyze the different detection and prevention mechanisms mitigating the security bottlenecks in Mobile Agents System. Third, to address the future security challenges. In a nutshell, this survey hands over a key to researchers who primarily target the security concerns of the mobile agent-based applications.

[1]  Aaron Kershenbaum,et al.  Mobile Agents: Are They a Good Idea? , 1996, Mobile Object Systems.

[2]  Zahir Tari,et al.  A Role-Based Access Control for Intranet Security , 1997, IEEE Internet Comput..

[3]  Eduardo Mena,et al.  SPRINGS: a scalable platform for highly mobile agents in distributed computing environments , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[4]  Jeffrey M. Bradshaw,et al.  Path-Based Security for Mobile Agents , 2002, SEMAS.

[5]  Luc Moreau,et al.  Mobile Code For Key Propagation , 2002, SEMAS.

[6]  Robbert van Renesse,et al.  An Introduction to the TACOMA Distributed System , 2006 .

[7]  Daniel Hagimont,et al.  A performance evaluation of the mobile agent paradigm , 1999, OOPSLA '99.

[8]  B. Soh,et al.  Authenticating mobile agent platforms using signature chaining without trusted third parties , 2005, 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service.

[9]  Jose L. Muñoz,et al.  A protocol for detecting malicious hosts based on limiting the execution time of mobile agents , 2003, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003.

[10]  Dejan S. Milojicic,et al.  Mobile Objects and Agents (MOA) , 1998, Distributed Syst. Eng..

[11]  Ramon Martí,et al.  Enabling Mobile Agents Interoperability Through FIPA Standards , 2006, CIA.

[12]  Walter Binder,et al.  Portable Resource Reification in Java-Based Mobile Agent Systems , 2001, Mobile Agents.

[13]  Vijay Varadharajan,et al.  A Security Architecture for Mobile Agent Based Applications , 2004, World Wide Web.

[15]  Oliver A. McBryan,et al.  An Overview of Message Passing Environments , 1994, Parallel Comput..

[16]  R. Al-Jaljouli,et al.  Secure Mobile Agent-based E-Negotiation for On-Line Trading , 2007, 2007 IEEE International Symposium on Signal Processing and Information Technology.

[17]  Umit Topaloglu,et al.  Secure mobile agent execution in virtual environment , 2008, Autonomous Agents and Multi-Agent Systems.

[18]  William M. Farmer,et al.  Security for Mobile Agents: Issues and Requirements , 1996 .

[19]  Edwin K. P. Chong,et al.  Efficient multicast packet authentication using signature amortization , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[20]  Luís Valente,et al.  Mobile agent security and Telescript , 1996, COMPCON '96. Technologies for the Information Superhighway Digest of Papers.

[21]  Koen De Bosschere,et al.  Program obfuscation: a quantitative approach , 2007, QoP '07.

[22]  László Gulyás,et al.  An Overview of Mobile Software Systems , 2000 .

[23]  Moti Yung,et al.  Sliding Encryption: A Cryptographic Tool for Mobile Agents , 1997, FSE.

[24]  C. Chellappan,et al.  Identifying the split personality of the malicious host in the mobile agent environment , 2008, 2008 4th International IEEE Conference Intelligent Systems.

[25]  Daniel Serrano,et al.  Protecting agents from malicious hosts using TPM , 2009, Int. J. Comput. Sci. Appl..

[26]  Marco Caccamo,et al.  Sandboxing Controllers for Cyber-Physical Systems , 2011, 2011 IEEE/ACM Second International Conference on Cyber-Physical Systems.

[27]  Noopur Katre,et al.  Trusted third party for data security in cloud environment , 2016, 2016 2nd International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB).

[28]  C. Jayakumar,et al.  PROTECTION OF FREE ROAMING MOBILE AGENTS USING CUSTOMIZED ROOT CANAL ALGORITHM AGAINST MALICIOUS HOST ATTACKS , 2014 .

[29]  Azizah Abdul Rahman,et al.  Signature-based Multi-Layer Distributed Intrusion Detection System using Mobile Agents , 2013, Int. J. Netw. Secur..

[30]  Wilmuth Müller,et al.  A Test Suite for the Evaluation of Mobile Agent Platform Security , 2006, 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology.

[31]  Fritz Hohl,et al.  Mole – Concepts of a mobile agent system , 1999, World Wide Web.

[32]  Bent Thomsen,et al.  Mobile Agents—The new paradigm in computing , 1997 .

[33]  S. Ilarri,et al.  Comparison and Performance Evaluation of Mobile Agent Platforms , 2007, Third International Conference on Autonomic and Autonomous Systems (ICAS'07).

[34]  Vijay Sureshkumar Java security , 1998 .

[35]  C. Chellappan,et al.  Performance analysis of mobile agent failure recovery in e-service applications , 2010, Comput. Stand. Interfaces.

[36]  Rolf Oppliger Security issues related to mobile code and agent-based systems , 1999, Comput. Commun..

[37]  Paolo Bellavista,et al.  Mobeyes: smart mobs for urban monitoring with a vehicular sensor network , 2006, IEEE Wireless Communications.

[38]  Luca Cardelli,et al.  A language with distributed scope , 1995, POPL '95.

[39]  Marianne Swanson,et al.  Security metrics guide for information technology systems , 2003 .

[40]  Ming-Bo Lin New path history management circuits for Viterbi decoders , 2000, IEEE Trans. Commun..

[41]  Antonio Maña,et al.  TPM-based protection for mobile agents , 2011, Secur. Commun. Networks.

[42]  Ichiro Satoh,et al.  Building reusable mobile agents for network management , 2003, IEEE Trans. Syst. Man Cybern. Part C.

[43]  Jun Liu,et al.  A Novel Free-Roaming Mobile Agent Security Mechanism by Trusted Computing Technology , 2008, 2008 International Conference on Computer Science and Software Engineering.

[44]  Wayne A. Jansen,et al.  Mobile Agent Security , 1999 .

[45]  G. C. Nandi,et al.  Protection of mobile agent and its itinerary from malicious host , 2011, 2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011).

[46]  Jon Ølnes,et al.  Mobile Agent Security - Issues and Directions , 1999, IS&N.

[47]  C. Chellappan,et al.  Protection of Mobile Agent Platform through Attack Identification Scanner (AIS) by Malicious Identification Police (MIP) , 2008, 2008 First International Conference on Emerging Trends in Engineering and Technology.

[48]  Zahia Guessoum,et al.  Using a Trust-Based Environment Key for Mobile Agent Code Protection , 2008 .

[49]  Christian F. Tschudin,et al.  Towards mobile cryptography , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).

[50]  Moshe Kam,et al.  Secure Mobile Agents on Ad Hoc Wireless Networks , 2003, IAAI.

[51]  Gene Tsudik,et al.  Itinerant Agents for Mobile Computing , 1995, IEEE Communications Surveys & Tutorials.

[52]  David Wong,et al.  Concordia: An Infrastructure for Collaborating Mobile Agents , 1997, Mobile Agents.

[53]  Michael Sonntag,et al.  Mobile agent security based on payment , 2000, OPSR.

[54]  P. D. O'Brien,et al.  FIPA — Towards a Standard for Software Agents , 1998 .

[55]  Gora Chand Nandi,et al.  Self-reliant mobile code: a new direction of agent security , 2014, J. Netw. Comput. Appl..

[56]  Joann J. Ordille,et al.  When agents roam, who can you trust? , 1996, Proceedings of COM'96. First Annual Conference on Emerging Technologies and Applications in Communications.

[57]  Wilmuth Müller,et al.  Evaluating the security of mobile agent platforms , 2009, Autonomous Agents and Multi-Agent Systems.

[58]  Luis Moura Silva,et al.  Comparing the performance of mobile agent systems: a study of benchmarking , 2000, Comput. Commun..

[59]  Giovanni Vigna,et al.  Cryptographic Traces for Mobile Agents , 1998, Mobile Agents and Security.

[60]  Fritz Hohl,et al.  Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts , 1998, Mobile Agents and Security.

[61]  L. Badger,et al.  Self-Protecting Mobile Agents Obfuscation Techniques Evaluation Report , 2002 .

[62]  V.K. Wei,et al.  A taxonomy for attacks on mobile agent , 2001, EUROCON'2001. International Conference on Trends in Communications. Technical Program, Proceedings (Cat. No.01EX439).

[63]  Holger Peine,et al.  The Architecture of the Ara Platform for Mobile Agents , 1999, Mobile Agents.

[64]  Niklas Borselius Mobile agent security , 2002 .

[65]  William M. Farmer,et al.  Security for Mobile Agents: Authentication and State Appraisal , 1996, ESORICS.

[66]  Daniel C. DuVarney,et al.  Model-carrying code: a practical approach for safe execution of untrusted applications , 2003, SOSP '03.

[67]  Edin Arnautovic,et al.  System Security Requirements Analysis:A Smart Grid Case Study , 2014, Syst. Eng..

[68]  Miguel Mira da Silva,et al.  An Overview of AgentSpace: A Next-Generation Mobile Agent System , 1998, Mobile Agents.

[69]  El Mamoun Souidi,et al.  Security of Mobile Agent Platforms Using Access Control and Cryptography , 2015, KES-AMSTA.

[70]  Daniela Rus,et al.  Market-based resource control for mobile agents , 1998, AGENTS '98.

[72]  Cátia Santos-Pereira,et al.  A secure RBAC mobile agent access control model for healthcare institutions , 2013, Proceedings of the 26th IEEE International Symposium on Computer-Based Medical Systems.

[73]  Victor K.-W. Wei,et al.  Defenses against the Truncation of Computation Results of Free-Roaming Agents , 2002, ICICS.

[74]  Giovanni Vigna,et al.  Designing Distributed Applications with Mobile Code Paradigms , 1997, Proceedings of the (19th) International Conference on Software Engineering.

[75]  Matthias Reich,et al.  Integrating mobile agents into the mobile middleware , 2005, Personal Technologies.

[76]  Steve Vinoski,et al.  CORBA: integrating diverse applications within distributed heterogeneous environments , 1997, IEEE Commun. Mag..

[77]  C. Chellappan,et al.  Protecting free-roaming mobile agent against multiple colluded truncation attacks , 2007, MobiMedia.

[78]  Salima Hacini Using dynamic adaptability to protect mobile agents code , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[79]  Levente Buttyán,et al.  Introducing Trusted Third Parties to the Mobile Agent Paradigm , 2001, Secure Internet Programming.

[80]  Ciarán Bryce A Security Framework for a Mobile Agent System , 2000, ESORICS.

[81]  Bernhard Rinner,et al.  Distributed embedded smart cameras for surveillance applications , 2006, Computer.

[82]  Ljiljana Brankovic,et al.  An Overview of Security Issues and Techniques in Mobile Agents , 2004, Communications and Multimedia Security.

[83]  Samuel Pierre,et al.  A New Protocol for Protecting a Mobile Agent Using a Reference Clone , 2005, MATA.

[84]  Arkady B. Zaslavsky,et al.  Countering security vulnerabilities in agent execution using a self executing security examination , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..

[85]  Sergi Robles,et al.  An implementation of self-protected mobile agents , 2004, Proceedings. 11th IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, 2004..

[86]  C. Stefanelli,et al.  Mobile agents protection in the Internet environment , 1999, Proceedings. Twenty-Third Annual International Computer Software and Applications Conference (Cat. No.99CB37032).

[87]  Ig Ibert Bittencourt,et al.  A survey of security in multi-agent systems , 2012, Expert Syst. Appl..

[88]  Abolfazl Esfandi,et al.  Mobile agent security in multi agent environments using a multi agent-multi key approach , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.

[89]  Eduardo Mena Nieto,et al.  Mobile agents and mobile devices: friendship or difficult relationship? , 2009 .

[90]  Wayne Jansen,et al.  NIST Special Publication 800-19 – Mobile Agent Security , 2000 .

[91]  Y. Yemini,et al.  MarketNet: market-based protection of information systems , 1998, ICE '98.

[92]  Dejan S. Milojicic,et al.  MASIF: The OMG mobile agent system interoperability facility , 1998, Personal Technologies.

[93]  Veljko M. Milutinovic,et al.  Mobile Agents and Java Mobile Agents Toolkits , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[94]  Audun Jøsang,et al.  A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[95]  José Neuman de Souza,et al.  A Secure Mobile Agents Platform Based on a Peer-to-Peer Infrastructure , 2006, International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL'06).

[96]  U. Wilhelm Cryptographically Protected Objects , 1997 .

[97]  Andy Ju An Wang Information security models and metrics , 2005, ACM-SE 43.

[98]  Wayne A. Jansen,et al.  Countermeasures for mobile agent security , 2000, Comput. Commun..

[99]  Volker Roth,et al.  Access control and key management for mobile agents , 1998, Comput. Graph..

[100]  Ivan Marsá-Maestre,et al.  Mobile Agents for Service Personalization in Smart Environments , 2008, J. Networks.

[101]  Lein Harn,et al.  An Improved Free-Roaming Mobile Agent Security Protocol against Colluded Truncation Attacks , 2006, 30th Annual International Computer Software and Applications Conference (COMPSAC'06).

[102]  Israel Ben-Shaul,et al.  Dynamic layout of distributed applications in FarGo , 1999, Proceedings of the 1999 International Conference on Software Engineering (IEEE Cat. No.99CB37002).

[103]  Ahmed Karmouch,et al.  Mobile software agents: an overview , 1998, IEEE Commun. Mag..

[104]  Amirreza Masoumzadeh,et al.  A survey of security issue in multi-agent systems , 2011, Artificial Intelligence Review.

[105]  David M. Chess,et al.  Security Issues in Mobile Code Systems , 1998, Mobile Agents and Security.

[106]  Jose L. Muñoz,et al.  Punishing manipulation attacks in mobile agent systems , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[107]  Jianwei Niu,et al.  Rethinking Security Requirements in RE Research , 2014 .

[108]  Hasan Omar Al-Sakran,et al.  Intelligent Traffic Information System Based on Integration of Internet of Things and Agent Technology , 2015 .

[109]  Jose L. Muñoz,et al.  Mobile Agent Watermarking and Fingerprinting: Tracing Malicious Hosts , 2003, DEXA.

[110]  Adel Aneiba,et al.  MOBILE AGENTS TECHNOLOGY AND MOBILITY , 2004 .

[111]  Stuart Haber,et al.  How to time-stamp a digital document , 1990, Journal of Cryptology.

[112]  Wayne A. Jansen,et al.  Determining privileges of mobile agents , 2001, Seventeenth Annual Computer Security Applications Conference.

[113]  Nicolas Lhuillier,et al.  FOUNDATION FOR INTELLIGENT PHYSICAL AGENTS , 2003 .

[114]  Volker Roth,et al.  Secure Recording of Itineraries through Co-operating Agents , 1998, ECOOP Workshops.

[115]  Anne T. Nguyen,et al.  Protecting Mobile Agents against Malicious Hosts in an Internet-based E-commerce Environment , 2003 .

[116]  David Kotz,et al.  Mobile agents and the future of the internet , 1999, OPSR.

[117]  Gian Pietro Picco µCODE: A Lightweight and Flexible Mobile Code Toolkit , 1998, Mobile Agents.

[118]  Tarig Mohamed Ahmed Using Secure-Image Mechanism to Protect Mobile Agent Against Malicious Hosts , 2009 .

[119]  Magdy Saeb,et al.  Protecting Mobile Agents against Malicious Host Attacks Using Threat Diagnostic AND/OR Tree , 2003 .

[120]  G. Geetha,et al.  Secure Communication Protocol for Protecting Computation Result of Free Roaming Mobile Agent , 2014, J. Comput. Sci..

[121]  David K. Gifford,et al.  Implementing Remote Evaluation , 1990, IEEE Trans. Software Eng..

[122]  George Cybenko,et al.  D'Agents: Security in a Multiple-Language, Mobile-Agent System , 1998, Mobile Agents and Security.

[123]  Xavier Leroy,et al.  Java Bytecode Verification: Algorithms and Formalizations , 2003, Journal of Automated Reasoning.

[124]  Mehdi Jazayeri,et al.  Gypsy: a component-based mobile agent system , 2000, Proceedings 8th Euromicro Workshop on Parallel and Distributed Processing.

[125]  Jan Fabian Ehmke,et al.  A mathematical programming technique for matching time-stamped records in logistics and transportation systems , 2016 .

[126]  D. Richard Kuhn,et al.  Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems , 1997, RBAC '97.

[127]  P. Marikkannu,et al.  A Secure Mobile Agent System against Tailgating Attacks , 2011 .

[128]  B. R. Badrinath,et al.  M-RPC: a remote procedure call service for mobile clients , 1995, MobiCom '95.

[129]  Giovanni Vigna,et al.  Protecting Mobile Agents through Tracing , 1997 .

[130]  Robert Wahbe,et al.  Efficient software-based fault isolation , 1994, SOSP '93.

[131]  Christian F. Tschudin,et al.  Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.

[132]  Ayman I. Kayssi,et al.  Trends in Mobile Agent Applications , 2005, J. Res. Pract. Inf. Technol..

[133]  Ramandeep Kaur,et al.  Integrated Mechanism to Prevent Agent Blocking in Secure Mobile Agent Platform System , 2010, 2010 International Conference on Advances in Computer Engineering.

[134]  Richard Ssekibuule,et al.  MOBILE AGENT SECURITY AGAINST MALICIOUS PLATFORMS , 2010, Cybern. Syst..

[135]  Levent Ertaul,et al.  Mobile Agent Security , 2006, Security and Management.

[136]  Jiann-I Pan,et al.  Secure Mobile Agent for Telemedicine Based on P2P Networks , 2013, Journal of Medical Systems.

[137]  Hassan Babiker,et al.  Artificial Immune System Based Data Miner , 2011 .

[138]  Tony White,et al.  Mobile agents for network management , 1998, IEEE Communications Surveys & Tutorials.

[139]  Volker Roth,et al.  Mutual Protection of Co-operating Agents , 2001, Secure Internet Programming.

[140]  Danny B. Lange,et al.  Seven good reasons for mobile agents , 1999, CACM.

[141]  H. Raghav Rao,et al.  Security in grid computing: A review and synthesis , 2008, Decis. Support Syst..

[142]  Danny B. Lange,et al.  Programming and Deploying Java¿ Mobile Agents with Aglets¿ , 1998 .

[143]  Xiaogang Wang,et al.  A Free-Roaming Mobile Agent Security Protocol Based on Anonymous Onion Routing and k Anonymous Hops Backwards , 2008, ATC.

[144]  Frances M. T. Brazier,et al.  A Security Framework for a Mobile Agent System , 2002 .

[145]  Giovanna Di Marzo Serugendo,et al.  Messenger-Based Operating Systems , 1994 .

[146]  Jian Lu,et al.  Path-history-based access control for mobile agents , 2006, Int. J. Parallel Emergent Distributed Syst..

[147]  Daniel M. Zimmerman,et al.  benefits and drawbacks of current Java mobile agent systems , 1997 .

[148]  Gora Chand Nandi,et al.  Fragmentation based encryption approach for self protected mobile agent , 2014, J. King Saud Univ. Comput. Inf. Sci..

[149]  John K. Ousterhout,et al.  The Safe-Tcl Security Model , 1998, USENIX Annual Technical Conference.

[150]  Thomas Magedanz,et al.  Mobile agents - enabling technology for active intelligent network implementation , 1998, IEEE Netw..

[151]  William M. Daley,et al.  Security Requirements for Cryptographic Modules , 1999 .

[152]  Akihiko Ohsuga,et al.  PLANGENT: An Approach to Making Mobile Agents Intelligent , 1997, IEEE Internet Comput..

[153]  Jim Alves-Foss,et al.  The use of encrypted functions for mobile agent security , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[154]  Sergi Robles,et al.  Self-protected mobile agents , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..

[155]  Ahmed Sameh Mohamed,et al.  Security in mobile agent systems , 2002, Proceedings 2002 Symposium on Applications and the Internet (SAINT 2002).

[156]  A. Sengupta,et al.  A formal approach to information security metrics , 2012, 2012 Third International Conference on Emerging Applications of Information Technology.

[157]  George C. Necula,et al.  Research on proof-carrying code for mobile-code security , 1997 .

[158]  N. Asokan,et al.  Protecting the computation results of free-roaming agents , 2005, Personal Technologies.

[159]  A. Majumdar,et al.  Interpreting Opacity in the Context of Information-hiding and Obfuscation in Distributed Systems , 2006, TENCON 2006 - 2006 IEEE Region 10 Conference.

[160]  David Wong,et al.  Java-based mobile agents , 1999, CACM.

[161]  Samuel Pierre,et al.  A security protocol for mobile agents based upon the cooperation of sedentary agents , 2007, J. Netw. Comput. Appl..

[162]  Kamlesh Dutta,et al.  On the approach of combining trust and security for securing mobile agents: Trust enhanced security , 2011, 2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011).

[163]  Samuel Pierre,et al.  Protection of a mobile agent with a reference clone , 2006, Comput. Commun..

[164]  Fritz Hohl,et al.  A framework to protect mobile agents by using reference states , 2000, Proceedings 20th IEEE International Conference on Distributed Computing Systems.

[165]  Jack W. Davidson,et al.  Protection of software-based survivability mechanisms , 2003, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].

[166]  Robert S. Gray,et al.  Agent Tcl: a Exible and Secure Mobile-agent System , 1996 .

[167]  Scott Oaks,et al.  Java Security , 1998 .

[168]  Ahmed Mohamed Generate Sub-Agent Mechanism to protect mobile agent privacy , 2012 .

[169]  Joan Borrell,et al.  Agent Migration over FIPA ACL Messages , 2003, MATA.

[170]  Jiannong Cao,et al.  Mobile Agents and Applications in Networking and Distributed Computing , 2012, Mobile Agents in Networking and Distributed Computing.

[171]  George Cybenko,et al.  Mobile agents for mobile computing , 1996 .

[172]  Ramachandran Baskaran,et al.  Artificial immune system based mobile agent platform protection , 2013, Comput. Stand. Interfaces.

[173]  Shan Liang,et al.  Mobile Agent Protection with Self-Modifying Code , 2011, J. Signal Process. Syst..

[174]  Fritz Hohl,et al.  A protocol to detect malicious hosts attacks by using reference states , 1999 .

[175]  T. Purusothaman,et al.  AFDB security protocol against colluded truncation attack in free roaming mobile agent environment , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).

[176]  Bennet S. Yee A Sanctuary for Mobile Agents , 2001, Secure Internet Programming.

[177]  Bruce Schneier,et al.  Environmental Key Generation Towards Clueless Agents , 1998, Mobile Agents and Security.

[178]  Charles J. Petrie,et al.  JATLite: A Java Agent Infrastructure with Message Routing , 2000, IEEE Internet Comput..

[179]  Zhifeng Xiao,et al.  Security and Privacy in Cloud Computing , 2013, IEEE Communications Surveys & Tutorials.

[180]  Mona M. Nasr A proposed paradigm for tracing the effect of security threats in various mobile agent systems , 2015, 2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW).

[181]  Leila Ismail,et al.  Evaluation of Authentication Mechanisms for Mobile Agents on top of Java , 2007, 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007).

[182]  Fred B. Schneider,et al.  Towards Fault-Tolerant and Secure Agentry , 1997, WDAG.

[183]  Robbert van Renesse,et al.  Operating system support for mobile agents , 1995, Proceedings 5th Workshop on Hot Topics in Operating Systems (HotOS-V).

[184]  Daniel Rixen,et al.  General framework for transfer path analysis: History, theory and classification of techniques $ , 2016 .

[185]  Anand R. Tripathi,et al.  Security in the Ajanta mobile agent system , 2001, Softw. Pract. Exp..

[186]  Jeffrey M. Bradshaw,et al.  Strong Mobility and Fine-Grained Resource Control in NOMADS , 2000, ASA/MA.

[187]  Xining Li The Role of Mobile Agents in M-commerce , 2007 .

[188]  J. C. Byington,et al.  Mobile agents and security , 1998, IEEE Commun. Mag..

[189]  Yang Gao,et al.  Secure cloud storage based on cryptographic techniques , 2012 .

[190]  Theodore A. Tsiligiridis,et al.  Security for Mobile Agents: Privileges and State Appraisal Mechanism , 2004, Neural Parallel Sci. Comput..

[191]  Anand R. Tripathi,et al.  Design issues in mobile agent programming systems , 1998, IEEE Concurr..

[192]  Rocco De Nicola,et al.  XKlaim and Klava: Programming Mobile Code , 2002, TOSCA.

[193]  Ramon Martí,et al.  Secure Integration of Distributed Medical Data Using Mobile Agents , 2006, IEEE Intelligent Systems.

[194]  Marta Mattoso,et al.  Odyssey-Search: A multi-agent system for component information search and retrieval , 2006, J. Syst. Softw..

[195]  Tarig Mohamed Ahmed Generate Sub-Agent Mechanism to protect mobile agent privacy , 2012, 2012 IEEE Symposium on Computers & Informatics (ISCI).

[196]  Steven Guan,et al.  Integrity protection for Code-on-Demand mobile agents in e-commerce , 2002, J. Syst. Softw..

[197]  Junmo Xiao,et al.  A novel free-roaming mobile agent security protocol against colluded truncation attacks , 2008, 2008 International Conference on Information and Automation.

[198]  Vipin Swarup,et al.  Authentication for Mobile Agents , 1998, Mobile Agents and Security.

[199]  Mayank Dave,et al.  Rescuing data of mobile agents blocked by malicious hosts in e-service applications , 2011, 2011 International Conference on Multimedia, Signal Processing and Communication Technologies.

[200]  Antonio Maña,et al.  A Hardware Based Infrastructure for Agent Protection , 2009 .

[201]  Maria Indrawan,et al.  Security Aspects of Software Agents in Pervasive Information Systems , 2003 .

[202]  H. Ishwaran,et al.  Radiation and Dual Checkpoint Blockade Activates Non-Redundant Immune Mechanisms in Cancer , 2015, Nature.

[203]  Yu-Fang Chung,et al.  Deployment of Secure Mobile Agents for Medical Information Systems , 2012, Journal of Medical Systems.

[204]  Ladislau Bölöni,et al.  The Bond Agent System and Applications , 2000, ASA/MA.

[205]  Danny B. Lange,et al.  Mobile agents with Java: The Aglet API , 1998, World Wide Web.