Please use this identifier to cite or link to this item:
https://hdl.handle.net/1959.11/62015
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Alfalayleh, Mousa | en |
dc.contributor.author | Brankovic, Ljiljana | en |
local.source.editor | Editor(s): David Chadwick and Bart Preneel | en |
dc.date.accessioned | 2024-08-08T01:34:23Z | - |
dc.date.available | 2024-08-08T01:34:23Z | - |
dc.date.issued | 2005 | - |
dc.identifier.citation | Conference proceedings: Communications and Multimedia Security, p. 59-78 | en |
dc.identifier.isbn | 0387244867 | en |
dc.identifier.isbn | 0387244859 | en |
dc.identifier.uri | https://hdl.handle.net/1959.11/62015 | - |
dc.description.abstract | <p>Mobile agents are programs that travel autonomously through a computer network in order to perform some computation or gather information on behalf of a human user or an application. In the last several years, mobile agents have found numerous applications including e-commerce. In most applications, the security of mobile agents is of the utmost importance. This paper gives an overview of the main security issues related to the mobile agent paradigm. These issues include security threats, requirements, and techniques for keeping the mobile agent platform and the agent itself secure against each other.</p> | en |
dc.language | en | en |
dc.publisher | Springer | en |
dc.relation.ispartof | Conference proceedings: Communications and Multimedia Security | en |
dc.relation.ispartofseries | IFIP Advances in Information and Communication Technology | en |
dc.title | An Overview of Security Issues and Techniques in Mobile Agents | en |
dc.type | Conference Publication | en |
dc.relation.conference | 8th Annual IFIP TC-6 TC-11 Conference on Communications and Multimedia Security | en |
dc.identifier.doi | 10.1007/0-387-24486-7_5 | en |
local.contributor.firstname | Mousa | en |
local.contributor.firstname | Ljiljana | en |
local.profile.school | School of Science and Technology | en |
local.profile.email | lbrankov@une.edu.au | en |
local.output.category | E1 | en |
local.record.place | au | en |
local.record.institution | University of New England | en |
local.date.conference | 15th to 18th of September, 2004 | en |
local.conference.place | United Kindom | en |
local.publisher.place | United States of America | en |
local.format.startpage | 59 | en |
local.format.endpage | 78 | en |
local.series.number | 175 | en |
local.peerreviewed | Yes | en |
local.contributor.lastname | Alfalayleh | en |
local.contributor.lastname | Brankovic | en |
dc.identifier.staff | une-id:lbrankov | en |
local.profile.orcid | 0000-0002-5056-4627 | en |
local.profile.role | author | en |
local.profile.role | author | en |
local.identifier.unepublicationid | une:1959.11/62015 | en |
dc.identifier.academiclevel | Academic | en |
dc.identifier.academiclevel | Academic | en |
local.title.maintitle | An Overview of Security Issues and Techniques in Mobile Agents | en |
local.output.categorydescription | E1 Refereed Scholarly Conference Publication | en |
local.conference.details | 8th Annual IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, United Kindom, 15th to 18th of September, 2004 | en |
local.search.author | Alfalayleh, Mousa | en |
local.search.author | Brankovic, Ljiljana | en |
local.uneassociation | No | en |
local.atsiresearch | No | en |
local.sensitive.cultural | No | en |
local.year.published | 2005 | en |
local.fileurl.closedpublished | https://rune.une.edu.au/web/retrieve/86cd7e46-2480-4bc9-9919-0621cb365145 | en |
local.subject.for2020 | 460699 Distributed computing and systems software not elsewhere classified | en |
local.subject.for2020 | 460499 Cybersecurity and privacy not elsewhere classified | en |
local.subject.seo2020 | 220499 Information systems, technologies and services not elsewhere classified | en |
local.profile.affiliationtype | External Affiliation | en |
local.profile.affiliationtype | External Affiliation | en |
Appears in Collections: | Conference Publication School of Science and Technology |
Files in This Item:
File | Description | Size | Format |
---|
SCOPUSTM
Citations
19
checked on Jan 25, 2025
Items in Research UNE are protected by copyright, with all rights reserved, unless otherwise indicated.