Anonymity and security for autonomous mobile agents.
Fatemeh RajiBehrouz Tork LadaniPublished in: IET Inf. Secur. (2010)
Keyphrases
- mobile agents
- mobile agent system
- network management
- ring signature scheme
- network connection
- distributed systems
- client server
- mobile agent technology
- load balancing
- security properties
- distributed computing
- fault tolerance
- information security
- security policies
- mobile users
- intelligent agents
- computing environments
- cooperative
- security requirements
- access control
- agent technology
- mobile computing
- virtual enterprise
- intrusion detection
- key management
- mobile environments
- fault tolerant
- ip networks
- blind signature scheme
- black hole
- network security
- intelligent systems
- black hole search