Download Now Free registration required
A system in which user programs (the agent) may willingly and separately travel from one the host to the mobile agent server is a mobile-agent system. A large exploitation of mobile agent systems is not possible without gratifying security structural design. The attack of a visiting code by a malicious host is the major barrier facing wide exploitation of mobile agents. The fact that host computers have complete control over all the programs of a visiting agent makes it very hard to protect agents from untrusted hosts. This has resulted to restricted exploitation of mobile agents to acknowledged hosts in congested networks where the agent's security is assured.
- Format: PDF
- Size: 183 KB