Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ametller J, Robles S, Ortega-Ruiz JA (2004) Self-protected Mobile Agents. In: Proc AAMAS. ACM
Baumann J, Hohl F, Rothermel K (1997) Mole — Concepts of a Mobile Agent System. Technical Report TR-1997-15
Corradi A, Cremonini M, Montanari R, Stefanelli C (1999) Mobile Agents In-tegrity for Electronic Commerce Applications. Information Systems 24 (6), Else-vier Science
Cubaleska B, Qiu W, Schneider M (2002) How to Play Sherlock Holmes in the World of Mobile Agents. In: Proc 7th Australasian Conf on Information Security and Privacy, LNCS 2384, Springer
Dadon-Elichai A (2004) RDS: Remote Distributed Scheme for Protecting Mobile Agents. In: Proc AAMAS, ACM
Dobrev S, Flocchini P, Prencipe G, Santoro N (2001) Mobile Search for a Black Hole in an Anonymous Ring. In: Proc DISC 2001, LNCS 2180, Springer
Ferreira LC, Dahab R (2002) Blinded-key Signatures: Securing Private Keys Em-bedded in Mobile Agents. In: Proc ACM Symp on Applied Computing
Ferreira LC, Uto N, Dahab R (2003) Combining Techniques for Protecting Mobile Agents. In: Actas del Secondo Congreso Iberoamericano de Seguridad Informatica, Mexico
Hohl F (1998) Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts. In: Mobile Agents and Security, LNCS 1419, Springer
Karjoth G, Asokan N, Gu¨lcu¨ C (1998) Protecting the Computation Results of Free-roaming agents. In: Rothermel K, Hohl F (eds) 2nd Int Workshop on Mo-bile Agents, LNCS 1477, Springer, Berlin
Karnik N, Tripathi A (1998) Agent Server Architecture for the Ajanta Mobile-Agent System. In: Proc Int Conf on Parallel and Distributed Processing Tech-niques and Applications, Las Vegas, NV
Lange DB, Oshima M (1998) Java Agent API: Programming and Deploying Aglets with Java. Addison-Wesley
Chun Lee D, Kim JG (2001) Adaptive Migration Strategy for Mobile Agents on Internet. In: Proc 2nd Int Workshop Technologies for E-Services, LNCS 2193, Springer
Lee H, Alves-Foss J, Harrison S (2004) The Use of Encrypted Functions for Mobile agent Security. In: Proc 37th Hawaii Int Conf on System Sciences
Menezes AJ, van Oorschot PC, Vanstone SA (1997) Handbook of Applied Cryp-tography. CRC Press, Boca Raton, FL
Sander T, Tschudin CF (1998) Towards Mobile Cryptography. In: IEEE Symp on Security and Privacy
Schneider FB (1997) Towards Fault-tolerant and Secure Agentry. In: Proc 11th Int Workshop on Distributed Algorithms, LNCS 1320, Springer
Tripathi A, Karnik N, Vora M, Ahmed T (1998) Ajanta — A System for Mobile-Agent Programming. Technical Report TR98-016
Vigna G (1998) Cryptographic Traces for Mobile Agents. In: Mobile Agents and Security, LNCS 1419, Springer
Westhoff D, Schneider M, Unger C, Kaderali F (1999) Methods for Protecting a Mobile Agent’s Route. In: Proc Information Security, 2nd Int Workshop, LNCS 1729, Springer
Westhoff D, Schneider M, Unger C, Kaderali F (2000) Protecting a Mobile Agent’s Route Against Collusions. In: Proc Selected Areas in Cryptography, 6th Annual Int Workshop, LNCS 1758, Springer
Yee BS (1999) A Sanctuary for Mobile Agents. In: Vitek J, Jensen CD (eds) Secure Internet Programming, LNCS 1603, Springer
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Cubaleska, B., Schneider, M. (2007). Denial of Service Detection in Mobile Agent Systems with Dependencies in Computations. In: Krämer, B.J., Halang, W.A. (eds) Contributions to Ubiquitous Computing. Studies in Computational Intelligence, vol 42. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-44910-2_12
Download citation
DOI: https://doi.org/10.1007/978-3-540-44910-2_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-44909-6
Online ISBN: 978-3-540-44910-2
eBook Packages: EngineeringEngineering (R0)