Evaluation of two security schemes for mobile agents.
Igor SobradoPublished in: Comput. Commun. Rev. (2001)
Keyphrases
- mobile agents
- mobile agent system
- network management
- load balancing
- network connection
- distributed systems
- client server
- distributed computing
- mobile agent technology
- agent technology
- fault tolerance
- intelligent agents
- information security
- mobile environments
- virtual enterprise
- machine learning
- cooperative
- mobile users
- computing environments
- intrusion detection
- fuzzy logic
- middleware architecture