Mobile Agents and Security
#5

ABSTRACT
Mobile Agent Applications and Security

Mobile agents are programs, typically written in a script language, which may be dispatched from a client computer and transported to a remote server computer for execution. Mobile agents offer an important new method of performing transactions and information retrieval in networks. The mobile agent introduces severe concerns for security. We consider the advantages offered by mobile agents and assess them by implementing various applications using it, the creation of a pervasive agent framework facilitates a very large number of network services and applications.
Implementation
Java provides an ideal implementation platform, furnishing tools that help streamline complex software applications. Java’s RMI technology facilitates mobile agent application development, providing key features for distributed network programming. This project uses java’s RMI technology as a foundation for mobile agents.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: seminario nueva vida, mobile agents aglets, mobile agents doc seminor projects comd in big bazar, mobile agents and the future of the internet, mobile agents computing, mobile agents security, importance of mobile agents in mobile computing,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
RE: Mobile Agents and Security - by vids - 08-07-2010, 11:19 PM
RE: Mobile Agents and Security - by vids - 12-07-2010, 07:10 PM
RE: Mobile Agents and Security - by seminar class - 29-03-2011, 03:06 PM

Possibly Related Threads...
Thread Author Replies Views Last Post
  Service-Oriented Architecture for Weaponry and Battle Command and Control Systems in 1 1,088 15-02-2017, 03:40 PM
Last Post: jaseela123d
  Cloud Computing Security: From Single to Multi-Clouds 1 844 14-02-2017, 04:56 PM
Last Post: jaseela123d
  SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-He 1 924 14-02-2017, 03:49 PM
Last Post: jaseela123d
  Security Analysis of the SASI Protocol computer science topics 2 1,961 21-06-2016, 10:30 PM
Last Post: Guest
  Security system using IP camera mechanical engineering crazy 5 4,430 16-03-2015, 02:52 PM
Last Post: seminar report asees
  MOBILE PHONE BASED ATTENDANCE TRACKING SYSTEM seminarsonly 25 21,306 06-03-2015, 07:18 PM
Last Post: unas
  A PROACTIVE APPROACH TO NETWORK SECURITY nit_cal 1 2,285 19-09-2014, 12:52 AM
Last Post: [email protected]
  Data Security Using Honey Pot System computer science topics 5 6,720 11-09-2014, 07:45 PM
Last Post: erhhk
  Mobile shop management System computer science technology 7 14,825 01-07-2014, 06:21 PM
Last Post: seminar report asees
  Folder Security System computer science topics 6 3,685 29-07-2013, 11:09 AM
Last Post: computer topic

Forum Jump: