• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Design and Implementation of Java Based Mobile Agent Security System


Kil-Hwan Choi, Sang-Hyun Bae, Journal of Internet Computing and Services, Vol. 3, No. 1, pp. 61-70, Feb. 2002
Full Text:

Abstract

Big-bang growth of Internet and World Wide Web is supplying much information and resources to network. However, use of internet resources is receiving many limitations by bandwidth for most users. But, through Applet way, can solve degradation problem that follow on static side and bandwidth of CGI that HTML has. Mobile Agent starts in user's computer to accomplish user's specification purpose and achieves work rooving network. Because code that can perform so is transmitted, and is achieved in network through network, important problem happens to mobile code's security naturally. In computing environment that this research uses this Mobile Agent way that can protect host and agent groping report, describe problem that happen composing Mobile Agent relationship concept and Mobile Agent, and do so that may present method that is studying to solve these problem, and use method that application is possible actually among presented method and design transfer agent's security system.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[APA Style]
Choi, K. & Bae, S. (2002). Design and Implementation of Java Based Mobile Agent Security System. Journal of Internet Computing and Services, 3(1), 61-70.

[IEEE Style]
K. Choi and S. Bae, "Design and Implementation of Java Based Mobile Agent Security System," Journal of Internet Computing and Services, vol. 3, no. 1, pp. 61-70, 2002.

[ACM Style]
Kil-Hwan Choi and Sang-Hyun Bae. 2002. Design and Implementation of Java Based Mobile Agent Security System. Journal of Internet Computing and Services, 3, 1, (2002), 61-70.