Shielding security sensitive parts of mobile agent
by Preeti; Praveena Chaturvedi; Rahul Hans
International Journal of Computational Intelligence Studies (IJCISTUDIES), Vol. 5, No. 3/4, 2016

Abstract: Distributed computing is an emerging area of today's internet era. Mobile agent is one of the paradigms used in applications of distributed computing. When a mobile agent arrives on a particular host, the host provides the environment to the mobile agent for execution, during this period the mobile agent is under full control of the host. Executing host can harm the agent in many ways such as it can alter the code of the agent, it can tamper the data collected by the agent up to this point and also it can change the itinerary of the agent etc. This paper focuses on the area of securing the code and data collected by the agent. Code security proposal is an integration of obfuscation and encryption/decryption technique, whereas for providing secure data, dual layer of encryption/decryption is applied.

Online publication date: Tue, 11-Apr-2017

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Computational Intelligence Studies (IJCISTUDIES):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com