175 years of Springer publishing +++ Limited offer: Any eBook in the Springer Archives 9.99 each!

Lecture Notes in Computer Science

Mobile Agents and Security

Editors: Vigna, Giovanni (Ed.)

Buy this book

eBook $69.99
price for USA (gross)
  • ISBN 978-3-540-68671-2
  • Digitally watermarked, DRM-free
  • Included format: PDF
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover $99.00
price for USA
  • ISBN 978-3-540-64792-8
  • Free shipping for individuals worldwide
  • Usually dispatched within 3 to 5 business days.
About this book

New paradigms can popularize old technologies. A new \standalone" paradigm, the electronic desktop, popularized the personal computer. A new \connected" paradigm, the web browser, popularized the Internet. Another new paradigm, the mobile agent, may further popularize the Internet by giving people greater access to it with less eort. MobileAgentParadigm The mobile agent paradigm integrates a network of computers in a novel way designed to simplify the development of network applications. To an application developer the computers appear to form an electronic world of places occupied by agents. Each agent or place in the electronic world has the authority of an individual or an organization in the physical world. The authority can be established, for example, cryptographically. A mobile agent can travel from one place to another subject to the des- nation place’s approval. The source and destination places can be in the same computer or in di erent computers. In either case,the agentinitiates the trip by executing a \go" instruction which takes as an argument the name or address of the destination place. The next instruction in the agent’s program is executed in the destination place, rather than in the source place. Thus, in a sense, the mobile agent paradigm reduces networking to a program instruction. A mobile agent can interact programmatically with the places it visits and, if the other agents approve, with the other agents it encounters in those places.

Table of contents (3 chapters)

  • Protecting Mobile Agents Against Malicious Hosts

    Tomas Sander, Christian F. Tschudin

    Pages 44-60

  • Safe, Untrusted Agents Using Proof-Carrying Code

    George C. Necula, Peter Lee

    Pages 61-91

  • Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts

    Fritz Hohl

    Pages 92-113

Buy this book

eBook $69.99
price for USA (gross)
  • ISBN 978-3-540-68671-2
  • Digitally watermarked, DRM-free
  • Included format: PDF
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover $99.00
price for USA
  • ISBN 978-3-540-64792-8
  • Free shipping for individuals worldwide
  • Usually dispatched within 3 to 5 business days.
Loading...

Recommended for you

Loading...

Bibliographic Information

Bibliographic Information
Book Title
Mobile Agents and Security
Editors
  • Giovanni Vigna
Series Title
Lecture Notes in Computer Science
Series Volume
1419
Copyright
1998
Publisher
Springer-Verlag Berlin Heidelberg
Copyright Holder
Springer-Verlag Berlin Heidelberg
eBook ISBN
978-3-540-68671-2
DOI
10.1007/3-540-68671-1
Softcover ISBN
978-3-540-64792-8
Series ISSN
0302-9743
Edition Number
1
Number of Pages
XII, 257
Topics