{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:01:35Z","timestamp":1754157695211,"version":"3.41.2"},"reference-count":15,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2005,7,1]],"date-time":"2005-07-01T00:00:00Z","timestamp":1120176000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005,7,1]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>This paper seeks to describe an approach to mitigate the unsoluble malicious host problem.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>By using obfuscation as a component of communication patterns and their switching in an environment of cooperating agents the malicious host can be detected and the attacked agents can be deleted.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>Finds that the information about the detected malicious host can be used further, e.g. to prevent another mobile agent from visiting this host.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>This paper will be helpful to people involved in information management and computer security issues.<\/jats:p><\/jats:sec>","DOI":"10.1108\/09685220510602022","type":"journal-article","created":{"date-parts":[[2005,6,22]],"date-time":"2005-06-22T02:12:51Z","timestamp":1119406371000},"page":"203-211","source":"Crossref","is-referenced-by-count":1,"title":["Mitigating the mobile agent malicious host problem by using communication patterns"],"prefix":"10.1108","volume":"13","author":[{"given":"I.","family":"Stengel","sequence":"first","affiliation":[]},{"given":"K.P.","family":"Fischer","sequence":"additional","affiliation":[]},{"given":"U.","family":"Bleimann","sequence":"additional","affiliation":[]},{"given":"J.","family":"Stynes","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"unstructured":"Baumann, J. (1999), \u201cControl algorithms for mobile agents\u201d, Technical Report, University of Stuttgart, Stuttgart.","key":"key2021010620320668600_b1"},{"unstructured":"Chess, D.M., Grosof, B., Harrison, C., Levine, D., Parris, C. and Tsudik, G. (1995), \u201cItinerant agents for mobile computing\u201d, IEEE Personal Communications, Vol. 2 No. 5, pp. 34\u201049.","key":"key2021010620320668600_b2"},{"unstructured":"Farmer, W.M., Guttman, J.D. and Swarup, V. (1996), \u201cSecurity for mobile agents: issues and requirements\u201d, Proceedings of the 19th National Information Systems Security Conference, Baltimore, MA, 3\u20105 September, pp. 591\u20107.","key":"key2021010620320668600_b3"},{"unstructured":"FIPA (2002), Communicative Act Library Specification, Foundation for Intelligent Physical Agents, London.","key":"key2021010620320668600_b4"},{"unstructured":"Hong, W., Guangzhou, Z. and Shouxun, L. (2001), \u201cAn efficient control mechanism for mobile agents\u201d, Proceedings of the 7th International Conference on Computer Networks and Mobile Computing, ICCNMC\u201901, Beijing, 16\u201019 October.","key":"key2021010620320668600_b5"},{"unstructured":"Karnik, N.M. and Tripathi, A.R. (2000), \u201cA security architecture for mobile agents in Ajanta\u201d, Proceedings of the 20th International Conference on Distributed Computing Systems, Taipei, 10\u201013 April.","key":"key2021010620320668600_b6"},{"unstructured":"Page, J., Zaslavsky, A. and Indrawan, M. (2004), \u201cA buddy model of security for mobile agent communities operating in pervasive scenarios\u201d, School of Computer Science and Software Engineering, Monash University, Melbourne.","key":"key2021010620320668600_b7"},{"doi-asserted-by":"crossref","unstructured":"Roth, V. (1999), \u201cMutual protection of co\u2010operating agents\u201d, Lecture Notes in Computer Science #1603, Springer\u2010Verlag, New York, NY.","key":"key2021010620320668600_b8","DOI":"10.1007\/3-540-48749-2_13"},{"unstructured":"Sameh, A. and Fakhry, D. (2002), \u201cSecurity in mobile agent systems\u201d, Proceedings of the 2002 Symposium on Applications and the Internet, (SAINT\u201902), Nara\u2010shi, 28 January\u20101 February.","key":"key2021010620320668600_b9"},{"doi-asserted-by":"crossref","unstructured":"Sander, T. and Tschudin, C.F. (1998), \u201cMobile agents and security, Protecting Mobile Agents against Malicious Hosts, Springer\u2010Verlag, New York, NY.","key":"key2021010620320668600_b10","DOI":"10.1007\/3-540-68671-1_4"},{"unstructured":"Stengel, I., Fischer, K.P., Bleimann, U. and Stynes, J. (2004), \u201cAn approach to the mobile agent malicious host problem\u201d, Proceedings of the 4th International Networking Conference, Plymouth, 6\u20109 July, pp. 369\u201076.","key":"key2021010620320668600_b13"},{"doi-asserted-by":"crossref","unstructured":"Wilhelm, U.G., Staamann, S.M. and Buttyan, L. (2000), \u201cA pessimistic approach to trust in mobile agent platforms\u201d, IEEE Internet Computing, Vol. 4 No. 5, pp. 40\u20108.","key":"key2021010620320668600_b14","DOI":"10.1109\/4236.877485"},{"doi-asserted-by":"crossref","unstructured":"Yee, B.S. (1999), \u201cA sanctuary for mobile agents\u201d, Secure Internet Programming, Springer Verlag, New York, NY.","key":"key2021010620320668600_b15","DOI":"10.1007\/3-540-48749-2_12"},{"doi-asserted-by":"crossref","unstructured":"Stengel, I., Bleimann, U. and Stynes, J. (2003), \u201cSocial insects and mobile agents in a virtual university\u201d, Campus\u2010Wide Information Systems, Vol. 20 No. 3, pp. 84\u20109.","key":"key2021010620320668600_frg1","DOI":"10.1108\/10650740310484223"},{"unstructured":"Stengel, I., Fischer, K.P., Bleimann, U. and Stynes, J. (2003), \u201cProblems in mobile agent systems\u201d, Proceedings of the GI Conference, Bad Schussenried, hrsg. Von Gesellschaft f\u00fcr Informatik, Grasbrunn 2004, pp. 263\u20105.","key":"key2021010620320668600_frg2"}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685220510602022","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685220510602022\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685220510602022\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:08:54Z","timestamp":1753402134000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/13\/3\/203-211\/183407"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,7,1]]},"references-count":15,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2005,7,1]]}},"alternative-id":["10.1108\/09685220510602022"],"URL":"https:\/\/doi.org\/10.1108\/09685220510602022","relation":{},"ISSN":["0968-5227"],"issn-type":[{"type":"print","value":"0968-5227"}],"subject":[],"published":{"date-parts":[[2005,7,1]]}}}