(How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions.
Joris ClaessensBart PreneelJoos VandewallePublished in: ACM Trans. Internet Techn. (2003)
Keyphrases
- mobile agents
- security issues
- information security
- security mechanisms
- mobile agent system
- load balancing
- client server
- distributed systems
- electronic transactions
- cloud computing
- agent technology
- privacy preserving
- mobile users
- payment systems
- knowledge discovery
- third party
- website
- real time
- wireless networks
- e government
- multi agent
- reinforcement learning
- rfid tags
- information systems
- artificial intelligence