"Mobile agents and security" - Information and Links:

Mobile agents and security - Info and Reading Options

Book's cover
The cover of “Mobile agents and security” - Open Library.

"Mobile agents and security" was published by Springer in 1998 - Berlin, it has 256 pages and the language of the book is English.


“Mobile agents and security” Metadata:

  • Title: Mobile agents and security
  • Author:
  • Language: English
  • Number of Pages: 256
  • Publisher: Springer
  • Publish Date:
  • Publish Location: Berlin

“Mobile agents and security” Subjects and Themes:

Edition Specifications:

  • Pagination: xii, 256 p. :

Edition Identifiers:

AI-generated Review of “Mobile agents and security”:


"Mobile agents and security" Description:

The Open Library:

New paradigms can popularize old technologies. A new \standalone" paradigm, the electronic desktop, popularized the personal computer. A new \connected" paradigm, the web browser, popularized the Internet. Another new paradigm, the mobile agent, may further popularize the Internet by giving people greater access to it with less eort. MobileAgentParadigm The mobile agent paradigm integrates a network of computers in a novel way designed to simplify the development of network applications. To an application developer the computers appear to form an electronic world of places occupied by agents. Each agent or place in the electronic world has the authority of an individual or an organization in the physical world. The authority can be established, for example, cryptographically. A mobile agent can travel from one place to another subject to the des- nation place’s approval. The source and destination places can be in the same computer or in di erent computers. In either case,the agentinitiates the trip by executing a \go" instruction which takes as an argument the name or address of the destination place. The next instruction in the agent’s program is executed in the destination place, rather than in the source place. Thus, in a sense, the mobile agent paradigm reduces networking to a program instruction. A mobile agent can interact programmatically with the places it visits and, if the other agents approve, with the other agents it encounters in those places.

Read “Mobile agents and security”:

Read “Mobile agents and security” by choosing from the options below.

Search for “Mobile agents and security” downloads:

Visit our Downloads Search page to see if downloads are available.

Find “Mobile agents and security” in Libraries Near You:

Read or borrow “Mobile agents and security” from your local library.

Buy “Mobile agents and security” online:

Shop for “Mobile agents and security” on popular online marketplaces.