• M-TREE

  • Referenced in 14 articles [sw02565]
  • grid computing, software copy protection and secure mobile agents by providing secure computing environments that...
  • ProActive

  • Referenced in 9 articles [sw05575]
  • incoming requests, a mobile and secure agent, and a component with server and client interfaces...
  • MCMAS

  • Referenced in 82 articles [sw09463]
  • typically specified by considering high-level agents attitudes. In particular, specification languages based on epistemic ... variety of areas including robotics, security protocols, web-services, etc. For example, security specifications involving...
  • Concordia

  • Referenced in 6 articles [sw18597]
  • agent persistence, reliable agent transmission, and agent security. Concordia offers a flexible scheme for dynamic ... arbitrary method entry points within a common agent application and extends the notion of simple ... agents across a network. Concordia has also been designed to provide for fairly complete security...
  • MetaMorph

  • Referenced in 20 articles [sw01575]
  • learning from past experiences and learning future agent interactions by simulating future dynamic, emergent behaviours ... tolerance, and security. The proposed architecture is implemented as a multi-agent virtual manufacturing system...
  • MARISM-A

  • Referenced in 2 articles [sw02936]
  • Implementation of secure architectures for mobile agents in MARISM-A. This paper introduces MARISM ... Secure Migration. MARISM-A is a secure mobile agent platform providing complex security mechanisms...
  • MILENIO

  • Referenced in 1 article [sw02265]
  • agent system with a comprehensive security Current mobile agent systems provide very simple security models ... appropriately while offering comprehensive security to the server and agents against mutual or third party ... modify the security permissions at runtime. Secure agent transmission and server authentication is achieved ... users. We managed to create a secure mobile agent system with a graphical interface that...
  • ASITA

  • Referenced in 1 article [sw02557]
  • ASITA: Advanced security infrastructure for multi-agent-applications in the telematic area. An approach ... solve the security aspects raised by agent systems, especially with mobile code ... facilitating security and providing a secure runtime environment. Software agents and their communities are given ... about security, service provisioning is secured. Communities of agents are enriched with security functionality...
  • Condor-G

  • Referenced in 49 articles [sw09651]
  • Condor-G: A Computation Management Agent for Multi-Institutional Grids. In recent years, there ... handles job management, resource selection, security, and fault tolerance. We also present results from application...
  • LDYIS

  • Referenced in 3 articles [sw01359]
  • automatic verification of security protocols based on multi-agent systems semantics. We give the syntax...
  • MAWS

  • Referenced in 1 article [sw01354]
  • also illustrates how the mobile agent can be secured against confidentiality and integrity attacks during ... well as guarding hosts from malicious agents...
  • IRIS

  • Referenced in 13 articles [sw19373]
  • strategic security allocation in transportation networks. Security is a concern of major importance to governments ... possible. Deterministic allocation of available law enforcement agents introduces predictable vulnerabilities that can be exploited...
  • ACVisualizer

  • Referenced in 1 article [sw00016]
  • modeling migration, intelligence, natural grouping and security in agent-based systems. In this article...
  • MetaKlaim

  • Referenced in 5 articles [sw01810]
  • programming) and Klaim (a Kernel Language for Agents Interaction and Mobility), to permit interleaving ... linking of code fragments), dynamic checking of security policies at administrative boundaries and `traditional’ computational...
  • XDoC-WFMS

  • Referenced in 1 article [sw01394]
  • documents, micro-agent based event and exception handling, and secure document access...
  • MCMAS-X

  • Referenced in 3 articles [sw02864]
  • verify authentication properties in the TESLA secure stream protocol. MCMAS-X is an extension ... checker MCMAS a verification tool for multi-agent systems...
  • DISCOVER

  • Referenced in 8 articles [sw02247]
  • control network of sensors, actuators, and interaction agents at the back-end. The interaction servers ... directly accessed at the interaction server. Security and authentication are provided using customizable access control...
  • BANANA

  • Referenced in 3 articles [sw01396]
  • purpose of explicitly modeling mobility. Sites and agents (i.e., processes) are modeled as nested boxes ... framework to reason about information flow and security when mobility is an issue...
  • SAMBA

  • Referenced in 1 article [sw42123]
  • SAMBA: a generic framework for secure federated multi-armed bandits. The multi-armed bandit ... reinforcement learning model where a learning agent repeatedly chooses an action (pull a bandit ... cumulative reward maximization problem in a secure federated learning setting, where multiple data owners keep...
  • FADM

  • Referenced in 1 article [sw38850]
  • most serious threats to network security. Software-Defined Networking (SDN) has recently emerged ... collected through the SDN controller and sFlow agents. Then an entropy-based method is used...