Mobile agents and security - Info and Reading Options
By Giovanni Vigna

"Mobile agents and security" was published by Springer in 1998 - Berlin, it has 256 pages and the language of the book is English.
“Mobile agents and security” Metadata:
- Title: Mobile agents and security
- Author: Giovanni Vigna
- Language: English
- Number of Pages: 256
- Publisher: Springer
- Publish Date: 1998
- Publish Location: Berlin
“Mobile agents and security” Subjects and Themes:
- Subjects: ➤ Mobile agents (Computer software) - Computer security - Geheimschrift - Agents mobiles (logiciels) - Agents intelligents (logiciels) - Codage - Computerbeveiliging - Systèmes informatiques - Sécurité informatique - Mesures de sûreté - Agent mobile - Agentia - Computernetwerken - Authentification - Traitement réparti - Sécurité - Kryptologie - Mobiler Agent - Computer software - Computer science - Computer networks - Operating systems (Computers) - Data encryption (Computer science) - Artificial intelligence
Edition Specifications:
- Pagination: xii, 256 p. :
Edition Identifiers:
- The Open Library ID: OL374285M - OL16932006W
- Online Computer Library Center (OCLC) ID: 39497922
- Library of Congress Control Number (LCCN): 98036069
- ISBN-10: 3540647929
- All ISBNs: 3540647929
AI-generated Review of “Mobile agents and security”:
"Mobile agents and security" Description:
The Open Library:
New paradigms can popularize old technologies. A new \standalone" paradigm, the electronic desktop, popularized the personal computer. A new \connected" paradigm, the web browser, popularized the Internet. Another new paradigm, the mobile agent, may further popularize the Internet by giving people greater access to it with less eort. MobileAgentParadigm The mobile agent paradigm integrates a network of computers in a novel way designed to simplify the development of network applications. To an application developer the computers appear to form an electronic world of places occupied by agents. Each agent or place in the electronic world has the authority of an individual or an organization in the physical world. The authority can be established, for example, cryptographically. A mobile agent can travel from one place to another subject to the des- nation place’s approval. The source and destination places can be in the same computer or in di erent computers. In either case,the agentinitiates the trip by executing a \go" instruction which takes as an argument the name or address of the destination place. The next instruction in the agent’s program is executed in the destination place, rather than in the source place. Thus, in a sense, the mobile agent paradigm reduces networking to a program instruction. A mobile agent can interact programmatically with the places it visits and, if the other agents approve, with the other agents it encounters in those places.
Read “Mobile agents and security”:
Read “Mobile agents and security” by choosing from the options below.
Search for “Mobile agents and security” downloads:
Visit our Downloads Search page to see if downloads are available.
Find “Mobile agents and security” in Libraries Near You:
Read or borrow “Mobile agents and security” from your local library.
- The WorldCat Libraries Catalog: Find a copy of “Mobile agents and security” at a library near you.
Buy “Mobile agents and security” online:
Shop for “Mobile agents and security” on popular online marketplaces.
- Ebay: New and used books.