{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T21:57:13Z","timestamp":1648591033560},"reference-count":27,"publisher":"World Scientific Pub Co Pte Lt","issue":"04","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Soft. Eng. Knowl. Eng."],"published-print":{"date-parts":[[2005,8]]},"abstract":"<jats:p> Security modeling for agents has been one of the most challenging issues in developing practical mobile agent software systems. In the past, researchers have developed mobile agent systems with emphasis either on protecting mobile agents from malicious hosts or protecting hosts from malicious agents. In this paper, we propose a security based mobile agent system architecture that provides a general solution to protecting both mobile agents and agent hosts in terms of agent communication and agent migration. We present a facilitator agent model that serves as a middleware for secure agent communication and agent migration. The facilitator agent model, as well as the mobile agent model, is based on agent-oriented G-nets \u2014 a high level Petri net formalism. To illustrate our formal modeling technique for mobile agent systems, we provide an example of agent migration to show how a design error can be detected. <\/jats:p>","DOI":"10.1142\/s0218194005002518","type":"journal-article","created":{"date-parts":[[2005,8,30]],"date-time":"2005-08-30T07:43:07Z","timestamp":1125387787000},"page":"719-746","source":"Crossref","is-referenced-by-count":3,"title":["A SECURITY BASED MODEL FOR MOBILE AGENT SOFTWARE SYSTEMS"],"prefix":"10.1142","volume":"15","author":[{"given":"HAIPING","family":"XU","sequence":"first","affiliation":[{"name":"Computer and Information Science Department, University of Massachusetts Dartmouth, North Dartmouth, MA 02747-2300, USA"}]},{"given":"ZHIGUO","family":"ZHANG","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Illinois at Chicago, 851 S. Morgan Street, Chicago, IL 60607-7053, USA"}]},{"given":"SOL M.","family":"SHATZ","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Illinois at Chicago, 851 S. Morgan Street, Chicago, IL 60607-7053, USA"}]}],"member":"219","published-online":{"date-parts":[[2011,11,21]]},"reference":[{"key":"rf1","unstructured":"K.\u00a0Rothermel and M.\u00a0Schwehm, Encyclopedia for Computer Science and Technology\u00a040, eds. A.\u00a0Kent and J. G.\u00a0Williams (Marcel Dekker, New York, 1999)\u00a0pp. 155\u2013176."},{"key":"rf3","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010090405266"},{"key":"rf4","doi-asserted-by":"publisher","DOI":"10.1145\/258077.258079"},{"key":"rf5","unstructured":"C.\u00a0Mascolo, Third Int. Conf. on Coordination Models and Languages, LNCS\u00a01594, eds. P.\u00a0Ciancarini and A.\u00a0Wolf (Springer-Verlag, 1999)\u00a0pp. 37\u201352."},{"key":"rf6","first-page":"1040","volume":"28","author":"Cabri G.","journal-title":"IEEE Trans. on Software Engineering"},{"key":"rf7","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011443827037"},{"key":"rf9","first-page":"15","volume":"29","author":"Xu H.","journal-title":"IEEE Trans. on Software Engineering (IEEE TSE)"},{"key":"rf11","doi-asserted-by":"publisher","DOI":"10.1145\/958961.958963"},{"key":"rf12","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0031846"},{"key":"rf13","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025859021913"},{"key":"rf14","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-61604-7_67"},{"key":"rf15","doi-asserted-by":"publisher","DOI":"10.1109\/32.685257"},{"key":"rf16","doi-asserted-by":"crossref","unstructured":"J.\u00a0Baumann, Proc. 1st Int. Workshop on Mobile Agents (MA'97), Communication concepts for mobile agent systems (Springer Verlag, 1997)\u00a0pp. 123\u2013135.","DOI":"10.1007\/3-540-62803-7_29"},{"key":"rf17","doi-asserted-by":"publisher","DOI":"10.1109\/35.689631"},{"key":"rf18","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68671-1_4"},{"key":"rf19","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-61770-1_31"},{"key":"rf20","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68671-1_9"},{"key":"rf21","doi-asserted-by":"publisher","DOI":"10.1145\/570132.570136"},{"key":"rf24","first-page":"31","volume":"29","author":"Xu D.","journal-title":"IEEE Trans. on Software Engineering"},{"key":"rf26","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(96)00162-8"},{"key":"rf27","doi-asserted-by":"publisher","DOI":"10.1109\/5.24143"},{"key":"rf28","volume-title":"Software Agents","author":"Finin T.","year":"1997"},{"key":"rf32","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44564-1_8"},{"key":"rf33","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"rf34","volume-title":"Security in Computing","author":"Pfleeger C. P.","year":"2002"},{"key":"rf35","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-739X(02)00128-0"},{"key":"rf36","volume-title":"INA: Integrated Net Analyzer","author":"Roch S.","year":"1999"}],"container-title":["International Journal of Software Engineering and Knowledge Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218194005002518","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T21:47:30Z","timestamp":1565128050000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0218194005002518"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,8]]},"references-count":27,"journal-issue":{"issue":"04","published-online":{"date-parts":[[2011,11,21]]},"published-print":{"date-parts":[[2005,8]]}},"alternative-id":["10.1142\/S0218194005002518"],"URL":"https:\/\/doi.org\/10.1142\/s0218194005002518","relation":{},"ISSN":["0218-1940","1793-6403"],"issn-type":[{"value":"0218-1940","type":"print"},{"value":"1793-6403","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005,8]]}}}