{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T07:10:19Z","timestamp":1748934619828},"reference-count":18,"publisher":"Engineering and Technology Publishing","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["jcm"],"published-print":{"date-parts":[[2020]]},"DOI":"10.12720\/jcm.15.3.221-230","type":"journal-article","created":{"date-parts":[[2020,5,15]],"date-time":"2020-05-15T10:15:32Z","timestamp":1589537732000},"page":"221-230","source":"Crossref","is-referenced-by-count":3,"title":["Mobile Agent Security Based on Cryptographic Trace and SOS Agent Mechanisms"],"prefix":"10.12720","author":[{"name":"Laboratory of Mathematics, Computer Sciences and Applications-Information Security Faculty of Sciences, Mohammed V University in Rabat. Morocco","sequence":"first","affiliation":[]},{"given":"Sophia","family":"Alami-Kamouri","sequence":"first","affiliation":[]},{"given":"Nabil","family":"Moukafih","sequence":"additional","affiliation":[]},{"given":"Ghizlane","family":"Orhanou","sequence":"additional","affiliation":[]},{"given":"Said","family":"Elhajji","sequence":"additional","affiliation":[]}],"member":"4977","published-online":{"date-parts":[[2020]]},"reference":[{"key":"ref0","unstructured":"[1] W. A. Jansen, \"Mobile agents and security,\" in National of Standards and Technology Gaithersburg, MD 20899, Special publication 800-19, USA, 1998."},{"key":"ref1","unstructured":"[2] M. A. Madkour, F. E. Eassa, A. M. Ali, and N. U. Qayyum, \"Securing mobile-agent-based systems against malicious hosts,\" World Applied Sciences Journal, vol. 29, no. 2, pp. 287-297, 2014."},{"key":"ref2","unstructured":"[3] T. M. Ahmed, \"Using secure-image mechanism to protect mobile agent against malicious hosts,\" International Scholarly and Scientific Research and Innovation, vol. 3, no. 11, pp. 364-369, 2009."},{"key":"ref3","unstructured":"[4] M. Hefeeda and B. Bhargava, \"On mobile code security,\" Center of Education and Research in Information Assurance and Security, 2001."},{"key":"ref4","doi-asserted-by":"publisher","unstructured":"[5] F. Hohl, \"Time limited blackbox security: Protecting mobile agents from malicious hosts,\" in Mobile Agents and Security, Lecture Notes in Computer Science 1419, Springer-Verlag, Berlin, 1998, pp. 92-113.","DOI":"10.1007\/3-540-68671-1_6"},{"key":"ref5","doi-asserted-by":"publisher","unstructured":"[6] H. K. Tan and L. Moreau, \"Extending execution tracing for mobile code security,\" in Proc. Second International Workshop on Security of Mobile Multi Agent Systems, Italy, 2002.","DOI":"10.1145\/508791.508807"},{"key":"ref6","doi-asserted-by":"publisher","unstructured":"[7] S. Srivastava and G. C. Nandi, \"Fragmentation based encryption approach for self protected mobile agent,\" Journal of King Saud University - Computer and Information Sciences, vol. 26, pp. 131-142, 2014.","DOI":"10.1016\/j.jksuci.2013.08.002"},{"key":"ref7","doi-asserted-by":"publisher","unstructured":"[8] P. Dadhich, K. Dutta, and M. C. Govil, \"Security issues in mobile agents,\" International Journal of Computer Applications, vol. 11, no. 4, 2010.","DOI":"10.5120\/1574-2104"},{"key":"ref8","doi-asserted-by":"publisher","unstructured":"[9] G. Vigna, \"Cryptographic traces for mobile agents,\" in Proceeding Mobile Agents and Security Springer-Verlag, UK: London, 1998, pp. 137-153.","DOI":"10.1007\/3-540-68671-1_8"},{"key":"ref9","doi-asserted-by":"publisher","unstructured":"[10] S. Alami-Kamouri, G. Orhanou, and S. Elhajji, \"Mobile agent service model for smart ambulance,\" in Proc. 2nd EAI International Conference on ICT Infrastructures and Services for Smart Cities Brindisi, Italy, April 2017.","DOI":"10.1007\/978-3-319-67636-4_12"},{"key":"ref10","unstructured":"[11] M. Popa, \"Binary code disassembly for reverse engineering,\" Journal of Mobile, Embedded and Distributed Systems, vol. 4, no. 4, pp. 233-248, 2012."},{"key":"ref11","doi-asserted-by":"publisher","unstructured":"[12] F. Bellifemine, G. Caire, and D. Greenwood, Developing Multi-agent Systems with JADE, Chichester, England Hoboken, NJ: John Wiley, 2007.","DOI":"10.1002\/9780470058411"},{"key":"ref12","doi-asserted-by":"publisher","unstructured":"[13] N. Bouchemal and R. Maamri, \"CAPMA: Clone agent to protect mobile agents in dynamic environments,\" in Proc. International Conference on Advanced Aspects of Software Engineering, 2016.","DOI":"10.1109\/ICAASE.2016.7843865"},{"key":"ref13","unstructured":"[14] C. Zraria, H. Hachichab, and Khaled Ghediraa, \"Agent's security during communication in mobile agents system,\" in Proc. 19th International Conference on Knowledge Based and Intelligent Information and Engineering Systems, 2015."},{"key":"ref14","doi-asserted-by":"publisher","unstructured":"[15] X. Vila, A. Schuster, and A. Riera, \"Security for a multi-agent system based on JADE,\" Computers and Security, vol. 26, no. 3, pp. 91-400, 2007.","DOI":"10.1016\/j.cose.2006.12.003"},{"key":"ref15","doi-asserted-by":"publisher","unstructured":"[16] L. M. Tsai and J. Tsai, \"Formal modeling and analysis of a secure mobile-agent system,\" IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, vol. 38, no. 1, 2008.","DOI":"10.1109\/TSMCA.2007.909552"},{"key":"ref16","doi-asserted-by":"publisher","unstructured":"[17] S. Hanaoui, J. laassiri, and Y. Bergui, \"Security requirements and model for mobile agent authentication,\" Smart Network Inspired Paradigm Approaches in IOT Applications, pp. 179-189, July 2019.","DOI":"10.1007\/978-981-13-8614-5_11"},{"key":"ref17","unstructured":"[18] T. Bayer and C. Reich, \"Security of mobile agents in distributed java agent development framework (JADE) platforms,\" in Proc. Twelfth International Conference on Systems, Venice, April 2017."}],"container-title":["Journal of Communications"],"original-title":[],"link":[{"URL":"http:\/\/www.jocm.us\/uploadfile\/2020\/0214\/20200214021255947.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,4]],"date-time":"2021-01-04T06:59:57Z","timestamp":1609743597000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.jocm.us\/show-237-1515-1.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":18,"URL":"https:\/\/doi.org\/10.12720\/jcm.15.3.221-230","relation":{},"ISSN":["2374-4367"],"issn-type":[{"type":"print","value":"2374-4367"}],"subject":[],"published":{"date-parts":[[2020]]}}}