Guarding security sensitive content using confined mobile agents.
Guido van 't NoordendeFrances M. T. BrazierAndrew S. TanenbaumPublished in: SAC (2007)
Keyphrases
- mobile agents
- mobile agent system
- network management
- network connection
- client server
- distributed systems
- mobile agent technology
- load balancing
- information security
- multimedia
- agent technology
- intrusion detection
- mobile environments
- access control
- security policies
- intelligent agents
- mobile users
- security issues
- network security
- fault tolerance
- mobile computing
- workflow management systems
- peer to peer
- computer networks