Sciweavers

4142 search results - page 185 / 829
» Trusting an Information Agent
Sort
View
INDOCRYPT
2001
Springer
15 years 8 months ago
Mobile Agent Route Protection through Hash-Based Mechanisms
Abstract. One approach to secure mobile agent execution is restricting the agent route to trusted environments. A necessary condition for this approach to be practical is that the ...
Josep Domingo-Ferrer
129
Voted
HICSS
1999
IEEE
112views Biometrics» more  HICSS 1999»
15 years 8 months ago
The Interoperability Problem: Bringing together Mobile Agents and Agent Communication Languages
Interoperability is a central issue for both the mobile agents community and the wider agents community. Unfortunately, the interoperability concerns are different between the two...
Yannis Labrou, Timothy W. Finin, Yun Peng
PDPTA
2000
15 years 5 months ago
Design, Implementation, and Experimentation on Mobile Agent Security for Electronic Commerce Applications
In this paper, a Shopping Information Agent System (SIAS) is built based on mobile agent technology. It sends out agents to di erent hosts in an electronic marketplace. The agents ...
Anthony H. W. Chan, Caris K. M. Wong, Tsz Yeung Wo...
CIA
2003
Springer
15 years 9 months ago
Meta-reasoning for Agents' Private Knowledge Detection
Abstract. Agent’s meta-reasoning is a computational process that implements agent’s capability to reason on a higher level about another agent or a community of agents. There i...
Jan Tozicka, Jaroslav Barta, Michal Pechoucek
EUROSYS
2008
ACM
16 years 1 months ago
Itrustpage: a user-assisted anti-phishing tool
Despite the many solutions proposed by industry and the research community to address phishing attacks, this problem continues to cause enormous damage. Because of our inability t...
Troy Ronda, Stefan Saroiu, Alec Wolman