Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Security in Mobile Agent Systems

Security in Mobile Agent Systems
View Sample PDF
Author(s): Chua Fang Fang (Multimedia University, Malaysia) and G. Radhamani (Multimedia University, Malaysia)
Copyright: 2009
Pages: 14
Source title: Mobile Computing: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): David Taniar (Monash University, Australia)
DOI: 10.4018/978-1-60566-054-7.ch198


View Security in Mobile Agent Systems on the publisher's website for pricing and purchasing information.


Agent technologies have grown rapidly in recent years as Internet usage has increased tremendously. Despite its numerous practical benefits and promises to provide an efficient way of mitigating complex distributed problems, mobile agent technology still lacks effective security measures, which severely restricts its scope of applicability. This chapter analyzes and synthesizes the different security threats and attacks that can possibly be imposed to mobile agent systems. The security solutions to resolve the problems and the research challenges in this field are presented.

Related Content

Aysu AltaƟ. © 2022. 23 pages.
Anusha Thakur. © 2022. 20 pages.
Yigit Yurder, Mehmet Altug Sahin. © 2022. 28 pages.
Anusha Thakur. © 2022. 26 pages.
Ali Yuce. © 2022. 22 pages.
Khouloud Mouihbi, Nedra Bahri-Ammari, Daouda Coulibaly. © 2022. 25 pages.
Anusha Thakur. © 2022. 17 pages.
Body Bottom