Shielding security sensitive parts of mobile agent.
PreetiPraveena ChaturvediRahul HansPublished in: Int. J. Comput. Intell. Stud. (2016)
Keyphrases
- mobile agents
- mobile agent system
- network management
- network connection
- load balancing
- client server
- distributed computing
- distributed systems
- fault tolerance
- security mechanisms
- distributed data mining
- fault tolerant
- mobile agent technology
- access control
- security issues
- security policies
- mobile computing
- mobile users
- agent technology
- network security
- security requirements
- information security
- intelligent agents
- computing environments
- communication networks
- multi agent systems
- security protocols
- context aware
- middleware architecture