Abstract
Security is a fundamental precondition for the acceptance of mobile agent systems. However, it is of utmost importance that applied security mechanims preserve the advantages of mobile agent systems compared to alternative approaches. If said mechanims neutralize them, the question must be raised why mobile agents were chosen at all. Said advantages include but are not limited to the flexibility and autonomy of mobile agents as well as their ability to be transported to and executed on hosts the agent’s sender might not fully trust. In particular, the latter poses dangerous threats which are, despite recent advances, not adequately solved.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsAuthor information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Roth, V. (1998). Secure Recording of Itineraries through Co-operating Agents. In: Demeyer, S., Bosch, J. (eds) Object-Oriented Technology: ECOOP’98 Workshop Reader. ECOOP 1998. Lecture Notes in Computer Science, vol 1543. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49255-0_76
Download citation
DOI: https://doi.org/10.1007/3-540-49255-0_76
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65460-5
Online ISBN: 978-3-540-49255-9
eBook Packages: Springer Book Archive