During the recent years of research on mobile agents, significant effort has been directed towards the identification of models of agent mobility suitable for network management a...
The emerging field of mobile computing (MC) studies systems in which computational components may change locations. In terms of hardware, mobile work is usually across heterogene...
Mobile agents are software entities consisting of code, data and state that can migrate autonomously from host to host executing their code. Unfortunately, security issues restrict...
Applications for mobile devices have some restrictions because of the limited capabilities and heterogeneity of these devices. However, their communication capabilities allow the d...
Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unauthorized parties. Current security mechanisms such as SELinux rely on tagging th...
Yung-Chuan Lee, Stephen Bishop, Hamed Okhravi, Sha...