A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
A formally-verified migration protocol for mobile, multi-homed hosts
2012
2012 20th IEEE International Conference on Network Protocols (ICNP)
These mobile, multi-homed computers are a poor match with an Internet architecture that binds connections to fixed endpoints with topology-dependent addresses. ...
We develop formal models to verify that ECCP works correctly in the presence of packet loss, out-of-order delivery, and frequent mobility, and to identify bugs and design limitations in earlier mobility ...
ACKNOWLEDGMENTS The authors would like to thank David Shue and Prem Gopalan for their involvement with ECCP's protocol design, as well as Pamela Zave for her advice and comments on earlier versions of ...
doi:10.1109/icnp.2012.6459961
dblp:conf/icnp/AryeNKRF12
fatcat:czdcl6bh2rbfdmsiguvuqvhecy
A Provably-Correct Protocol for Seamless Communication with Mobile, Multi-Homed Hosts
[article]
2012
arXiv
pre-print
These mobile, multi-homed computers are a poor match with an Internet architecture that binds connections to fixed end-points with topology- dependent addresses. ...
We use formal models to verify that ECCP works correctly in the presence of packet loss, out-of-order delivery, and frequent mobility, and to identify bugs and design limitations in earlier mobility protocols ...
To our knowledge, this is the first end-to-end migration protocol to be formally verified. ...
arXiv:1203.4042v1
fatcat:cnwfixayhjdovbsecglyx4d4h4
Increasing network resilience through edge diversity in NEBULA
2012
ACM SIGMOBILE Mobile Computing and Communications Review
Serval provides a new layer 3.5 service abstraction that naturally supports mobility, multi-homing, and multi-path transport, while CRYSTAL is a new virtualization scheme for software radios that makes ...
One of the attractions of cloud computing is its support for online services and data storage by thin clients such as mobile devices. ...
To our knowledge, this is the first mobility protocol to be formally verified; a unique trait of our model is the inclusion of network packet loss, duplication, and reordering. ...
doi:10.1145/2412096.2412099
fatcat:amnmjl4jxrebtdxm4rnd3x47sy
Hybrid Approach for Secure Mobile Agent Computations
[chapter]
2006
Lecture Notes in Computer Science
We review and analyze methods proposed for securing agent operations in the face of passive and active adversaries by means of secure multi-party computations. ...
Mobile agent applications are particularly vulnerable to malicious parties and thus require more stringent security measures-benefiting greatly from schemes where cryptographic protocols are utilized. ...
Once agents obtain host input they then migrate to a centralized trusted execution site where the multi-round protocol is evaluated. ...
doi:10.1007/11801412_5
fatcat:carpt5cu6zd4hegny7zurmx6pi
Information Security Approach in Open Distributed Multi-Agent Virtual Learning Environment
2014
International Journal of Computer Science & Information Technology (IJCSIT)
, and proposed the migration behaviour simulation for their active software components (software agents). ...
based on the implementation of two types of systems the first system with the centralized mobile agent information security management and the second system with decentralized mobile agents security management ...
ACKNOWLEDGEMENT The authors are grateful to the Applied Science University, Amman, Jordan, for the full financial support granted to this research. ...
doi:10.5121/ijcsit.2014.6102
fatcat:wjuhtvw5cfhp3hh6z7zvehx46i
Towards Secure Mobile Multiagent Based Electronic Marketplace Systems
2002
Electronical Notes in Theoretical Computer Science
In this paper we aim at a generic methodology to validate, assess, and construct mobile multi-agent systems in the domain of virtual market places. ...
It rests upon research carried out in the past to develop innovative engineering solutions for architectures based on the paradigm of mobile multi-agents. ...
For example, various solutions have been proposed to define and verify secure key-exchange protocols or to translate a given trust model into a formal security policy. ...
doi:10.1016/s1571-0661(04)80337-2
fatcat:kny4vf4gqzbklblcn7pldy6bim
Secure Multi-Attribute One-to-Many Bilateral Negotiation Framework for E-Commerce
2018
IEEE Transactions on Services Computing
I am most grateful to A/Prof. Jemal Abawajy, my academic supervisor for his close guidance, continuing support, and fruitful discussions throughout the research period. ...
Acknowledgement Verily all praise is for Allah for His exposed and concealed bounties at all times. We praise Him, seek His help, and seek His forgiveness. ...
Also, the security protocol is formally verified for the various security properties using Symbolic Trace Analyzer (STA). ...
doi:10.1109/tsc.2016.2560160
fatcat:m7mjxegydffbvm6synalhs5swm
Design, Validation, Simulation and Parametric Evaluation of a Novel Protocol for Locating Mobile Agents in Multiregion Environment
2008
Journal of Computer Science
We proposed a location management technique applicable for multi-region environment in which mobile agent did not update its location at every migration. ...
Location management is a necessity for locating mobile agents in a network of mobile agent hosts for controlling, monitoring and communication during processing and it still represents an open research ...
The SPC protocol [12] is a combination of DL protocol and PP protocol, applied to a multi-region mobile agent computing environment. ...
doi:10.3844/jcssp.2008.256.271
fatcat:xoraqmew7fbndhfr4bupkbsymy
Fragmentation based encryption approach for self protected mobile agent
2014
Journal of King Saud University: Computer and Information Sciences
ª 2013 Production and hosting by Elsevier B.V. on behalf of King Saud University. ...
The protocol is a combination of self decryption, co-operation and obfuscation technique. ...
We can verify our security protocol formally as follows. ...
doi:10.1016/j.jksuci.2013.08.002
fatcat:hrk4eqsnbjbujh7xrkn3vng4bm
A generic mobile agent framework for ambient intelligence
2008
Proceedings of the 2008 ACM symposium on Applied computing - SAC '08
Finally, given that this approach is formulated based on multi-agent standard concepts, it can be easily implemented as add-on for existing software agent platforms to achieve rapid deployment. ...
Compared to the existing state-of-the-art approaches, this framework creates a more decentralized and distributed AmI environment. ...
host sent back by LB i for migrating agent. ...
doi:10.1145/1363686.1364137
dblp:conf/sac/LeeKRG08
fatcat:a6ixrxhsbfbmvgy32p3zrybnya
Exploration of Various Fault Tolerance Techniques
2017
International Journal of Computer Applications
A mobile agent is composition of computer program that proceed autonomously for a user or application moving in the heterogeneous communication environment. ...
To verify fault and failure free process of mobile agent based applications, consistency need to be addressed. Fault tolerance is important to the further expansion of mobile agent applications. ...
Region-based Stage Construction Protocol RBSC protocol is used for fault tolerant execution of mobile agents in a multi-region mobile agent computing environment [2] . ...
doi:10.5120/ijca2017913436
fatcat:rqgp5mijdnbxzlvyzk2wecgzpm
A configurable mobile agent data protection protocol
2003
Proceedings of the second international joint conference on Autonomous agents and multiagent systems - AAMAS '03
This paper takes into account such criticisms and formally defines a new protocol that does not suffer from all the previous limitations. ...
This paper addresses the problem of protecting the data carried by mobile agents from the possible attacks of malicious execution hosts. ...
The first version of the multi-hop protocol [1] did not achieve data authenticity and for this reason had severe limitations. ...
doi:10.1145/860710.860712
fatcat:eda7w2qqjnfsna5tnv7sjg2uo4
A configurable mobile agent data protection protocol
2003
Proceedings of the second international joint conference on Autonomous agents and multiagent systems - AAMAS '03
This paper takes into account such criticisms and formally defines a new protocol that does not suffer from all the previous limitations. ...
This paper addresses the problem of protecting the data carried by mobile agents from the possible attacks of malicious execution hosts. ...
The first version of the multi-hop protocol [1] did not achieve data authenticity and for this reason had severe limitations. ...
doi:10.1145/860575.860712
dblp:conf/atal/MaggiS03
fatcat:4xjwwckrafbxjhotgarm2skiyy
On the design of a mobile agent environment for context-aware M-commerce
2010
2010 3rd International Conference on Computer Science and Information Technology
Due to technological advances of handheld computing and communication devices, Mobile commerce (Mcommerce) has emerged and attracted a growing number of research efforts. ...
M-commerce not only extends Internet-based Electronic commerce (E-commerce), but also offers a unique business opportunity with its own features, such as ubiquity, accessibility, portability, etc. ...
R. of China (90912003, 60773108 and 90812001) for supporting this research. ...
doi:10.1109/iccsit.2010.5563704
fatcat:jxmmhppnj5cfzdm56lqpnsr77q
Vulnerability Analysis of Mobile Agents Praxis in Mobile Ad-Hoc Networks
2017
International Journal of Computer Applications
In the emerging world, in a resource constrained network like mobile ad hoc network, the mobile agent is becoming a favorable option for creating applications like service discovery, network discovery, ...
A mobile agent interacts with the node in a better way and provides enhanced options for the developers to design applications based on the disconnected network. ...
The host generates mobile agents for the specific task. iii. Mobile agent migrates to the trusted host (S i ) with encrypted data. ...
doi:10.5120/ijca2017913633
fatcat:4w5bixkydjahtcxzlgel3ev7xy
« Previous
Showing results 1 — 15 out of 7,714 results