Loading

A Review on Mobile Agent Security
Parul Ahuja1, Vivek Sharma2

1Parul Ahuja, Scholar, Department of CSE, JMIT, Radaur (Haryana), India.
2Vivek Sharma, Assistant Professor & HOD, Department of CSE, JMIT, Radaur (Haryana), India.

Manuscript received on 18 June 2012 | Revised Manuscript received on 25 June 2012 | Manuscript published on 30 June 2012 | PP: 83-88 | Volume-1 Issue-2, June 2012 | Retrieval Number: B0218051212/2012©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Mobile agents are enjoying a lot of popularity and are destined to influence research in distributed systems for the years to come. Thus far, technology has been instrumental in disseminating new design paradigms where application components are not permanently bound to the hosts where they execute. Mobile agents are gaining in complexity as they evolve and are now widely used in e-commerce. All phases of a business transaction, such as negotiating and signing contracts can be done using mobile agents. In this paper, we provided a brief introduction to the recent researches & developments associated with the field of mobile agents, highlighting various security threats, also touching the weakest hot-spots of the field which need to be nurtured.
Keywords: Intelligent Agent, Mobility, Security, Security Threats.

Scope of the Article: Mobility and Location-Dependent Services