A Scheme for Protecting Mobile Agents Based on Combining Obfuscated Control Flow and Time Checking Technology.
Jiehong WuYujie ZhangXiaowei WangGuiran ChangPublished in: CIS (2007)
Keyphrases
- mobile agents
- control flow
- mobile agent technology
- workflow management systems
- data flow
- client server
- distributed systems
- agent technology
- process model
- fault tolerance
- mobile agent system
- reverse engineering
- case study
- software testing
- mobile computing
- mobile users
- computing environments
- intelligent agents
- access control
- artificial intelligence
- computer systems
- middleware architecture