Access control and key management for mobile agents.
Volker RothMehrdad Jalali-SohiPublished in: Comput. Graph. (1998)
Keyphrases
- mobile agents
- key management
- access control
- resource constrained
- ad hoc networks
- wireless sensor networks
- client server
- distributed systems
- security policies
- security mechanisms
- data security
- distributed computing
- key distribution
- load balancing
- computing environments
- group communication
- secret key
- mobile agent system
- access control policies
- security model
- fault tolerance
- agent technology
- fault tolerant
- intelligent agents
- security requirements
- resource constraints
- mobile users
- network topology
- computational intelligence
- query processing