You are not logged in.

Mobile Agents Security Protocols

Al-Jaljuli,R and Abawajy,J 2014, Mobile Agents Security Protocols. In Al-Jaljuli,R and Abawajy,J (ed), Crisis Management: Concepts, Methodologies, Tools, and Applications, IGI Global, USA, pp.166-202, doi: 10.4018/978-1-4666-4707-7.ch007.

Attached Files
Name Description MIMEType Size Downloads

Title Mobile Agents Security Protocols
Author(s) Al-Jaljuli,R
Abawajy,J
Title of book Crisis Management: Concepts, Methodologies, Tools, and Applications
Editor(s) Al-Jaljuli,R
Abawajy,J
Publication date 2014
Chapter number 7
Start page 166
End page 202
Total pages 37
Publisher IGI Global
Place of Publication USA
Summary Mobile agents are expected to run in partially unknown and untrustworthy environments. They transport from one host to another host through insecure channels and may execute on non-trusted hosts. Thus, they are vulnerable to direct security attacks of intruders and non-trusted hosts. The security of information the agents collect is a fundamental requirement for a trusted implementation of electronic business applications and trade negotiations. This chapter discusses the security protocols presented in the literature that aim to secure the data mobile agents gather while searching the Internet, and identifies the security flaws revealed in the protocols. The protocols are analyzed with respect to the security properties, and the security flaws are identified. Two recent promising protocols that fulfill the various security properties are described. The chapter also introduces common notations used in describing security protocols and describes the security properties of the data that mobile agents gather.
ISBN 1466647078
9781466647077
DOI 10.4018/978-1-4666-4707-7.ch007
Field of Research 0 Not Applicable
Socio Economic Objective 890301 Electronic Information Storage and Retrieval Services
HERDC Research category B2 Book chapter in non-commercially published book
ERA Research output type B Book chapter
Copyright notice ©2014, IGI Global
Persistent URL http://hdl.handle.net/10536/DRO/DU:30070294

Document type: Book Chapter
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 5 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 16 Abstract Views, 0 File Downloads  -  Detailed Statistics
Created: Fri, 06 Mar 2015, 08:19:13 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.