Security for Mobile Agents: Authentication and State Appraisal.
William M. FarmerJoshua D. GuttmanVipin SwarupPublished in: ESORICS (1996)
Keyphrases
- mobile agents
- mobile agent system
- network management
- security mechanisms
- network connection
- mobile users
- load balancing
- client server
- agent technology
- security requirements
- computing environments
- security analysis
- mobile agent technology
- user authentication
- mobile computing
- distributed systems
- distributed computing
- intrusion detection
- authentication protocol
- fault tolerance
- intelligent agents
- middleware architecture
- virtual private network
- security protocols
- security issues
- network security
- access control