Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








29,169 Hits in 5.7 sec

A Flexible Management Framework for Certificate Status Validation [chapter]

Antonio Corradi, Rebecca Montanari, Cesare Stefanelli, Diana Berbecaru, Antonio Lioy, Fabio Maino
2000 IFIP Advances in Information and Communication Technology  
The provision of public key-based security services for complex and large scale organisations requires a Public Key Infrastructure (PKI) in charge of securely managing cryptographic keys/certificates.  ...  In addition, the paper claims that the framework flexibility, dynamicity arid transparency can greatly benefit from the adoption of the Mobile Agent (MA) technology because it exhibits the same intrinsic  ...  Acknowledgements Investigation supported by the Italian "Consiglio Nazionale delle Ricerche" in the framework of the Project "Global Applications in the Internet Area: Models and Programming Environments  ... 
doi:10.1007/978-0-387-35515-3_49 fatcat:ukic2l55ibcxbgomvjrb6ml6hu

Multi-domain Policy Based Management Using Mobile Agents [chapter]

Nazim Agoulmine, Mauro Fonseca, Alan Marshall
2001 Lecture Notes in Computer Science  
In this environment, mobile agents will act on behalf of users or third party service providers, to obtain the best end to end service based on a negotiation process between ISP policy management systems  ...  This paper describes a new framework for the interoperability between ISP management domain for the purpose of satisfying end user requirement based on service level agreements (SLA) set up between a customer  ...  The Policy Working Group [2] of the Internet Engineering Task Force is chartered to define a scalable and secure framework for policy definition and administration [3] [4] .  ... 
doi:10.1007/3-540-44651-6_22 fatcat:goiaeswhtrbfhmvsdeyyut6swu

Guest Editorial Special Issue on Emerging Social Internet of Things: Recent Advances and Applications

Giancarlo Fortino, Mohammad Mehedi Hassan, Mengchu Zhou, Andrzej M. Goscinski, Md Zakirul Alam Bhuiyan, Jianqiang Li, Sourav Bhattacharya
2018 IEEE Internet of Things Journal  
We also would like thanking all the reviewers for their efforts in the paper review phase, and for their valuable comments and constructive suggestions that allowed improving the quality of the papers.  ...  Finally, we appreciate the advice and support of the Editor-in-Chief of this JOURNAL, Prof.  ...  The authors propose a new an agent-based approach, relying on edge computing and SIoT, for the deployment and management of LSE.  ... 
doi:10.1109/jiot.2018.2860339 fatcat:xmomdbaplzg6tbvjns4skm7z3i

Application Security Models for Mobile Agent Systems

J. Todd McDonald, Alec Yasinsac
2006 Electronical Notes in Theoretical Computer Science  
Mobile agents are a distributed computing paradigm based on mobile autonomous programs.  ...  We introduce a trust framework to reason about application security requirements, trust expression, and agent protection mechanisms.  ...  Section 3 presents our framework for expressing trust and security in mobile agent systems.  ... 
doi:10.1016/j.entcs.2005.09.041 fatcat:m7dmct33z5e3heqrs2jrck7hce

Multimedia traffic security architecture for the internet of things

Liang Zhou, Han-Chieh Chao
2011 IEEE Network  
In this work, we design a new and efficient media-aware security framework for facilitating various multimedia applications in the Internet of Things.  ...  Abstract An important challenge for supporting multimedia applications in the Internet of Things is the security heterogeneity of wired and wireless sensor and actuator networks.  ...  In particular, a hybrid computation scheme called mobile-agent-based directed diffusion is proposed in [7] .  ... 
doi:10.1109/mnet.2011.5772059 fatcat:tdmcnwqz7zfp3ovqtjqktsyilq

Guest Editorial Special Issue on Edge-Cloud Interplay Based on SDN and NFV for Next-Generation IoT Applications

Sahil Garg, Song Guo, Vincenzo Piuri, Kim-Kwang Raymond Choo, Balasubramanian Raman
2020 IEEE Internet of Things Journal  
In "AI agent in software-defined network: Agent-based network service prediction and wireless resource scheduling optimization," the authors presented a mobile agent system, which uses AI agents deployed  ...  In "Reinforcement-learning-and belief-learning-based double auction mechanism for edge computing resource allocation," the authors presented a double auction-based MEC-IoT resource trading market, in which  ... 
doi:10.1109/jiot.2020.2999798 fatcat:sbfruvc4djh7haw3scb4u2jxku

A Taxonomy of Agent Technologies for Ubiquitous Computing Environments

Daqiang Zhang
2012 KSII Transactions on Internet and Information Systems  
The design, development and deployment of Mobile Agent (MA) systems for high-level inference and surveillance in wireless sensor networks and RFID systems have drawn increasing attention in the past decade  ...  It proposes a taxonomy, by which MA systems in ubiquitous computing environments are decomposed and discussed.  ...  This approach proposes a cross-layer framework to provide security for WSNs, which is a good solution that allows mobile and stationary agents to offer security in WSNs.  ... 
doi:10.3837/tiis.2012.02.006 fatcat:r7vytsxmmrhlhfzvcfxheejisq

Trends in Mobile Agent Applications

Mohamad A. Eid, Hassan Artail, Ayman I. Kayssi, Ali Chehab
2005 Journal of research and practice in information technology  
In this paper we present a comprehensive study of mobile agent applications.  ...  We end each section with a summary of the work done and provide directions for future work. Finally, we conclude with suggestions about promising research areas involving mobile agents.  ...  A Java-based web server, a plug-in server execution environment for web agents, and a uniform access method to web data have been realized.  ... 
dblp:journals/acj/EidAKC05 fatcat:6mlo5lvxhrcs5isqpiebvau3kq

Middleware challenges ahead

K. Geihs
2001 Computer  
Current projects focus on quality-of-service management in Corba, component-based software, and mobile agents. Geihs received a PhD in computer  ...  THE CHANGING ENVIRONMENT The communication and computing world has changed dramatically since the era in which early middleware developers worked in environments dominated by locally connected Unix workstations  ...  Acknowledgments I thank Anne-Marie Kermarrec, Ant Rowstron, and Marc Shapiro for their technical contributions and constructive comments.  ... 
doi:10.1109/2.928618 fatcat:dtnt2dnevndxfmus47kqbpyezm

Integrating Mobile and Intelligent Agents in Advanced E-commerce: A Survey [chapter]

Ryszard Kowalczyk, Mihaela Ulieru, Rainer Unland
2003 Lecture Notes in Computer Science  
for agents' migration and users' mobility, and deployment approaches.  ...  Finally, a summary of the considered systems is presented together with some concluding remarks including the current state and trends in developing mobile and intelligent agents in advanced agentmediated  ...  Casba (Competitive Agents for Secure Business Applications) [Casba] is an Esprit funded project to develop a framework for an electronic marketplace using multi-agent technology.  ... 
doi:10.1007/3-540-36559-1_22 fatcat:6gwq5sea3fbvxnimt7ssv55unm

Autonomic Framework for IT Security Governance

Sitalakshmi Venkatraman
2017 International Journal of Managing Information Technology  
attacks effectively using mobile agents.  ...  In addition, this paper provides a roadmap for autonomic IT security governance by applying the proposed framework The roadmap employs a continuous improvement feedback loop. for achieving the targeted  ...  This paper proposes autonomic framework for IT security governance that employs self-learning mechanisms using context-dependent mobile agents that are host-based as well as network-based for detecting  ... 
doi:10.5121/ijmit.2017.9301 fatcat:qtlqeaauefe7redgaayhqm4hhu

SECURE MOBILE AGENT TRADER SYSTEM

S Koriem, R Hassaan
2016 International Journal of Intelligent Computing and Information Sciences  
Policy-based security management has become a growing research area for mobile agent security. To ensure authorization in used to grant privileges to agents according to their roles.  ...  Mobile agent systems (MASs) that travel autonomously through a computer network in order to perform some computation or gather information on behalf of a human user or an application. business applications  ...  In trading system in JADE model by all parties to achieve two-way based security management has become a growing research area for mobile based access control (RBAC) is privileges to agents according  ... 
doi:10.21608/ijicis.2016.10011 fatcat:zskg4ojoxrhdrojvekqg3vfacy

Remote Configuration of Agent-Based Component Systems

Rainer Weinreich, Reinhold Plösch
2003 Journal of Object Technology  
We use mobile agents as the building blocks of a component-based system for remote supervision and control of both hard-and software in a distributed environment.  ...  We use mobile agent technology as the basis for a flexible component system for remote diagnosis and monitoring of hard-and software resources in heterogeneous distributed environments.  ...  In Section 3.2 we present an approach for automatically generating user interfaces from enhanced agent meta-data. g) Security: Security is a dominant requirement for Internet-based remote configuration  ... 
doi:10.5381/jot.2003.2.6.a1 fatcat:f75ueojf4rco3ne5747d4wfjvq

Guest Editorial: Special Issue on Blockchain and Edge Computing Techniques for Emerging IoT Applications

Victor C. M. Leung, Xiaofei Wang, F. Richard Yu, Dusit Niyato, Tarik Taleb, Sangheon Pack
2021 IEEE Internet of Things Journal  
Focusing on the research of social-aware cloud computing, cooperative cell caching, and mobile traffic offloading, he has authored over 100 technical papers in  ...  Hassija et al., in "A blockchain and edge-computing-based secure framework for government tender allocation," exploit a secure and transparent framework for government tenders.  ...  The article titled "Hybrid blockchain-based resource trading system for federated learning in edge computing" presents a hybrid blockchain-based resource trading system that considers the advantages of  ... 
doi:10.1109/jiot.2021.3050050 fatcat:rux57gjppjdqla556myxnvp4ve

A Review of Secure Authentication based e-Payment Protocol

Mr.B. Ratnakanth, Prof.P.S.Avadhani
2017 International Journal of Advanced Computer Science and Applications  
In the past decades, various methods were created to permit secure cash transaction using epayment frameworks. This study will review and discuss the epayment scheme.  ...  Because of this, the data protection and security ought to be viewed as a central part of ebusiness framework plan. Particularly enormous consideration is given to cash exchanges assurance.  ...  Additionally, on the internet based e-payment framework security is the main problem.  ... 
doi:10.14569/ijacsa.2017.080323 fatcat:jtvqv67qpfdcrffzhuvsqyreba
« Previous Showing results 1 — 15 out of 29,169 results