• Aucun résultat trouvé

A secure protocol based on a sedentary agent for mobile agent environments

N/A
N/A
Protected

Academic year: 2021

Partager "A secure protocol based on a sedentary agent for mobile agent environments"

Copied!
9
0
0

Texte intégral

Loading

Figure

Table  1  presents  the  possible  type  of  protections  against the various attacks listed at the beginning of this  section  and  the  current  approaches  which  ensure
Fig. 1:  Protocol concepts
Fig. 3:  Using timers
Fig. 4:  Run times of agents MA and EA
+2

Références

Documents relatifs

troller Agent tracks the status of resources in the datacenter. When the Scheduling Agent gets the response from the Controller Agent, it verifies if the proposed QoS and

Dominique Duhaut, "Distributed Algorithm For High Control Robotics Structures", International Conference On Artificial Intelligence – 1999 – Volume 1 p 45 à 50

This model has a major advantage that the domain remains unaffected by non trusted users (with only decreased amount of trust degree). But this model suffers from

Security in agent systems is obtained by regulating the information exchanged between and used by agents - by controlling the services used by each agent as well as the

For instance, a user cannot have a system class replaced by subtyping it since these classes are declared with (the access modifier) final. Finally, bytecode verifica-

Designed with complex service environments in mind and the service as a central concept, the JIAC IV agent framework constitutes a toolkit for developing and de- ploying

L'agent mobile utilisé dans cette solution est à base de composants, il s'agit de l'agent GAMA pour Agent Mobile Générique et adaptable, agent proposé dans le cadre de travail

Thus, network environment is populated by a set of mobile management agents that co-operate with each other in order to perform global security management activities (described in