[. Fipa and A. C. , Fipa acl message structure specification . Foundation for Intelligent Physical Agents, 2002.

M. Alfalayleh and L. Brankovic, An Overview of Security Issues and Techniques in Mobile Agents, Communications and Multimedia Security, pp.59-78, 2005.
DOI : 10.1007/0-387-24486-7_5

L. D. Anna, B. Matt, A. Reisse, T. Van-vleck, S. Schwab et al., Selfprotecting mobile agents obfuscation report, Network Associates Laboratories Report, 2003.

J. Aumasson, On the pseudo-random generator isaac, IACR Cryptology ePrint Archive, p.438, 2006.

P. Bella-vista, A. Corradi, C. Frederici, R. Montanari, and D. Tibaldi, Security for Mobile Agents: Issues and Challenges". Invited Chapter, the Book Handbook of Mobile Computing, I. Mahgoub, M. Ilyas, 2004.

F. Bellifemine, A. Poggi, and G. Rimassa, JADE, Proceedings of the fifth international conference on Autonomous agents , AGENTS '01, pp.216-217, 2001.
DOI : 10.1145/375735.376120

E. Bierman, T. Pretoria, and E. Cloete, Classification of Malicious Host Threats in Mobile Agent Computing South African Institute for Computer Scientists and Information Technologists, Proceedings of the 2002 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology, pp.141-148, 2002.

]. G. Blakl11, G. Blakley, and . Kabatiansky, Shamir's Threshold Scheme, Encyclopedia of Cryptography and Security, pp.1193-1194, 2011.
DOI : 10.1007/0-387-23483-7_389

G. R. Blakley, Safeguarding cryptographic keys, Proceedings of the national computer conference, pp.313-317, 1979.

J. Blasco, A. Orfila, and A. Ribagorda, Improving Network Intrusion Detection by Means of Domain-Aware Genetic Programming, 2010 International Conference on Availability, Reliability and Security, pp.327-332, 2010.
DOI : 10.1109/ARES.2010.53

I. Brahmi, S. B. Yahia, and P. Poncelet, A Snort-based mobile agent for a distributed intrusion detection system, IEEE Proceedings of the International Conference on Security and Cryptography (SECRYPT), pp.198-207, 2011.
URL : https://hal.archives-ouvertes.fr/lirmm-00798311

P. Braun and W. Rossak, Mobile agents : Basic concepts, mobility models and the tracy toolkit, 2005.

]. J. Brio01, Y. Briot, and . Demazeau, Introduction aux agents: Principes et architecture des systèmes multi-agents". Collection IC2, 2001.

]. R. Calhe10, R. Calheiros, A. Ranjan, C. A. Beloglazov, R. Derose et al., CloudSim:A toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms, Software: Practice and Experience, pp.23-50, 2010.

R. Canetti and H. Krawczyk, Universally Composable Notions of Key Exchange and Secure Channels, Advances in Cryptology, Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2002.
DOI : 10.1007/3-540-46035-7_22

J. Cao and S. K. Das, Mobile agents in networking and distributed computing, 2012.
DOI : 10.1002/9781118135617

L. Che and X. P. Yang, Research and Application of Mobile Agent in E-Commerce System, Applied Mechanics and Materials, pp.458-461, 2014.
DOI : 10.4028/www.scientific.net/AMM.519-520.458

]. B. Chen10, H. Chen, and . Cheng, A review of the applications of agent technology in traffic and transportation systems, IEEE Transactions on Intelligent Transport Systems, vol.2, issue.11, pp.485-497, 2010.

W. Diffie and M. Hellman, New directions in cryptography". Information Theory, IEEE Transactions on, vol.22, issue.6, pp.644-654, 1976.

]. A. Dastj10, K. A. Dastjerdi, S. G. Bakar, and . Tabatabaei, Distributed intrusion detection in clouds using mobile agents, Third International Conference on Advanced Engineering Computing and Applications in Sciences, Sliema, pp.175-180, 2010.

]. F. Dig12 and . Dignum, Agents for games and simulations, Autonomous Agents and Multi-Agent Systems, vol.2, issue.24, pp.217-220, 2012.

D. Eastlake and P. Jones, US secure hash algorithm 1 (SHA1)". No. RFC 3174, 2001.

]. A. Enge13 and . Enge, Bilinear pairings on elliptic curves". arXiv preprint, 2013.

M. Ennahbaoui and S. Elhajji, Swot Analysis of access control models, International Journal of Security and Its Applications, vol.8, issue.3, pp.407-424, 2014.

]. S. Fal06 and F. El-falou, Programmation répartie, optimisation par agent mobile, Thèse de doctorat, 2006.

]. W. Farm96, J. D. Farmer, V. Guttman, and . Swarup, Security for mobile agents: Authentication and state appraisal, Proceedings of the European Symposium on Research in Computer Security (ESORICS), pp.118-130, 1996.

M. Fasli, On agent technology for e-commerce: trust, security and legal issues, The Knowledge Engineering Review, vol.22, issue.01, pp.3-35, 2007.
DOI : 10.1017/S0269888907001014

J. Ferber, Multi-agent systems: an introduction to distributed artificial intelligence, 1999.

]. D. Fiore10, R. Fiore, and . Gennaro, Making the Diffie-Hellman Protocol Identity-Based, Topics in Cryptology-CT-RSA Proceeding of the 10th Cryptographers' Track at the RSA Conference, 2010.
DOI : 10.1007/978-3-642-11925-5_12

]. J. Galan11, O. Galante, P. Kharif, and . Alpeyev, Sony Network Breach Shows Amazon Clouds Appeal for Hackers Available: http : //www.bloomberg.com/news/2011 ? 05 ? 15/sony ? attack ? shows ? amazon ? s ? cloud ? service ? lures ? hackers ? at ? pennies ? an ? hour, html [Galla09] P. Gallagher. "Digital Signature Standard (DSS)". Federal Information Processing Standards Publication, FIPS PUB, 2009.

D. Gavalas, G. E. Tsekouras, and C. Anagnostopoulos, A mobile agent platform for distributed network and systems management, Journal of Systems and Software, vol.82, issue.2, pp.355-371, 2009.
DOI : 10.1016/j.jss.2008.06.034

H. Gilbert and H. Handschuh, Security Analysis of SHA-256 and Sisters, Selected Areas in Cryptography Proceedings of the 10th annual workshop, SAC, 2003.
DOI : 10.1007/978-3-540-24654-1_13

J. Gomuluch and M. Schroeder, Information agents on the move, Software Focus, pp.31-36, 2001.

M. S. Greenberg, J. C. Byington, T. Holding, and D. G. Harper, Mobile agents and security, IEEE Communications Magazine, vol.36, issue.7, pp.76-85, 1998.
DOI : 10.1109/35.689634

M. Hauswirth, C. Kerer, and R. Kurmanowytsch, A secure execution framework for Java, Proceedings of the 7th ACM conference on Computer and communications security , CCS '00, pp.43-52, 2000.
DOI : 10.1145/352600.352608

F. T. Ibharalu, A. B. Sofoluwe, and A. T. Akinwale, A reliable protection architecture for mobile agents in open network system, International journal of computer applications, vol.17, issue.7, pp.6-14, 2011.

H. Idrissi, A. Revel, and E. M. Souidi, A New Approach based on Cryptography and XML Serialization for Mobile Agent Security, ICAART (1), pp.403-411, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01356350

H. Idrissi, E. M. Souidi, and A. , Mobile Agent Security Using ID-Based Agreement Protocol and Binary Serialization, International Journal of Security and Its Applications, vol.9, issue.5, pp.19-30, 2015.
DOI : 10.14257/ijsia.2015.9.5.02

URL : https://hal.archives-ouvertes.fr/hal-01226191

H. Idrissi, E. M. Souidi, and A. , Security of Mobile Agent Platforms Using Access Control and Cryptography, Agent and Multi-Agent Systems: Technologies and Applications, pp.27-39, 2015.
DOI : 10.1007/978-3-319-19728-9_3

URL : https://hal.archives-ouvertes.fr/hal-01356342

H. Idrissi, M. Ennahbaoui, E. M. Souidi, and S. E. Hajji, Mobile Agents with Cryptographic Traces For Intrusion Detection in the Cloud Computing, Procedia Computer Science, vol.73, pp.179-186, 2015.
DOI : 10.1016/j.procs.2015.12.010

]. L. Ismail08 and . Ismail, A Secure Mobile Agents Platform, Journal of Communications, vol.3, issue.2, pp.1-12, 2008.
DOI : 10.4304/jcm.3.2.1-12

]. A. Jaffar13, C. J. Jaffar, and . Martinez, Detail Power Analysis of the SHA-3 Hashing Algorithm Candidates on Xilinx Spartan-3E, International Journal of Computer and Electrical Engineering, vol.4, issue.5, pp.410-413, 2013.
DOI : 10.7763/IJCEE.2013.V5.742

R. Jain, F. Anjum, and A. Umar, A comparison of mobile agent and client-server paradigms for information retrieval tasks in virtual enterprises, Proceedings Academia/Industry Working Conference on Research Challenges '00. Next Generation Enterprises: Virtual Organizations and Mobile/Pervasive Technologies. AIWORC'00. (Cat. No.PR00628), pp.209-213, 2000.
DOI : 10.1109/AIWORC.2000.843295

]. W. Jan99, T. Jansen, and . Karygiannis, Mobile agent security". Technical report National Institute of Standards and Technology, Special Publication 800-19, 1999.

]. V. Kap08, V. S. Kapoor, R. Abraham, and . Singh, Elliptic curve cryptography, ACM Ubiquity, vol.9, issue.20, pp.20-26, 2008.

]. H. Kholi12, F. Kholidy, and . Baiardi, CIDS: A Framework for Intrusion Detection in Cloud Systems, 9th International Conference on Information Technology: New Generations (ITNG), pp.379-385, 2012.

]. D. Lan99, M. Lange, and . Oshima, Seven good reasons for mobile agents, Commun. ACM, ACM, vol.42, pp.88-89, 1999.

J. S. Lee, C. C. Chang, P. Y. Chang, and C. C. Chang, Anonymous authentication scheme for wireless communications, International Journal of Mobile Communications, vol.5, issue.5, pp.590-601, 2007.
DOI : 10.1504/IJMC.2007.013941

]. Y. Li15, L. Li, and . Zhu, Data Acquisition System Research Based on Mobile Agent in Network Management, International Conference on Computer Science and Electronic Technology (ICCSET'14, 2015.

J. Liu, Z. Zhang, X. Chen, and K. S. Kwak, An efficient certificateless remote anonymous authentication scheme for wireless body area networks, 2012 IEEE International Conference on Communications (ICC), pp.332-342, 2014.
DOI : 10.1109/ICC.2012.6363786

]. T. Lu07, C. Lu, and . Hsu, Mobile agents for information retrieval in hybrid simulation environment, Journal of network and computer applications, pp.244-264, 2007.

[. M. Pich-]-m and . Pichiliani, Web site: http : //mrbool.com/dif f erences ? between ? binary ? serialization ? and ? serialization ? in ? javaIntroduction to Code Signing", (n.d.) From Microsoft Corporation, Microsoft Developer Network (MSDN) Web site:https : //msdn.microsof t.com/en ? us/library/ms537361%28v = vs.85%29.aspx [Madison03] "Signed Code Retrieved December 15Malware detection based on cloud computing integrating intrusion ontology representation, Introducing XML Serialization Differences between Binary Serialization and Serialization in Java IEEE Latin-American Conference on Communications (LATINCOM), pp.1-6, 2003.

]. D. Mayn11 and . Maynor, Metasploit toolkit for penetration testing, exploit development, and vulnerability research, 2011.

]. P. Mell11, T. Mell, and . Grance, The NIST definition of cloud computing". [Recommendations of the National Institute of Standards and Technology-Special Publication 800-145], Washington DC: NIST, 2011.

D. E. Menacer, H. Drias, and C. Sibertin-blanc, The MP architecture: towards a secure framework for mobile agents, International Journal of Agent-Oriented Software Engineering, vol.4, issue.4, pp.390-414, 2011.
DOI : 10.1504/IJAOSE.2011.043644

M. Metzger and G. Polakow, A Survey on Applications of Agent Technology in Industrial Process Control, IEEE Transactions on Industrial Informatics, vol.7, issue.4, pp.570-581, 2011.
DOI : 10.1109/TII.2011.2166781

]. D. Mills10, J. Mills, J. Martin, W. Burbank, and . Kasch, Network time protocol version 4: Protocol and algorithms specification, No. RFC5905, 2010.
DOI : 10.17487/rfc5905

]. D. Milo98, M. Milojicic, I. Breugst, J. Busse, S. Campbell et al., MASIF : The OMG Mobile Agent System Interoperability Facility, Personal and Ubiquitous Computing, pp.117-129, 1998.

D. S. Miloji?i?, W. Laforge, and D. Chauhan, Mobile objects and agents (moa), pp.595-610, 1999.

]. D. Mitro11, M. Mitrovic, Z. Ivanovic, M. Budimac, and . Vidakovic, An overview of agent mobility in heterogeneous environments, Workshop Proceedings on Applications of Software Agents, p.52, 2011.

]. A. Mousa06, A. Mousa, and . Hamad, Evaluation of the RC4 algorithm for data encryption, IJCSA, vol.3, issue.2, pp.44-56, 2006.

M. Mubarak, Z. Khan, S. Sultana, H. B. Asghar, H. F. Ahmad et al., A Dynamic Policy based Security Architecture for Mobile Agents". in "New Technologies , Mobility and Security, pp.493-505, 2007.

]. A. Murph06, G. P. Murphy, G. C. Picco, and . Roman, LIME, ACM Transactions on Software Engineering and Methodology, vol.15, issue.3, pp.279-328, 2006.
DOI : 10.1145/1151695.1151698

G. C. Necula, Proof-Carrying Code. Design and Implementation, pp.261-288
DOI : 10.1007/978-94-010-0413-8_8

]. G. Nec98, P. Necula, and . Lee, Safe, Untrusted Agents Using Proof-Carrying Code, pp.61-91, 1998.

B. O. Oguntunde, A. O. Osofisan, and G. A. Aderounmu, Embedded Mobile Agent (EMA) for Distributed Information Retrieval, International Journal of Computer Science and Information Security, vol.13, issue.3, p.84, 2015.

]. B. Over04, F. M. Overeinder, D. R. Brazier, and . De-groot, Cross-platform generative agent migration, Proceedings of the Fourth European Symposium on Intelligent Technologies , Hybrid Systems and their implementation on Smart Adaptive Systems, pp.356-363, 2004.

]. J. Page04, A. Page, M. Zaslavsky, and . Inrawan, Countering Security Vulnerabilities In Agent Execution Using A Self Executing Security, Proceeding of the 3rd International Joint conference on Autonomous Agents and Multi-Agents (AAMA2004), pp.1486-1487, 2004.

]. A. Patel10, Q. Patel, C. Qassim, and . Wills, A survey of intrusion detection and prevention systems, Information Management & Computer Security, vol.18, issue.4, pp.277-290, 2010.
DOI : 10.1108/09685221011079199

]. R. Phan05 and . Phan, Fixing the integrated diffie-hellman-DSA key exchange protocol, IEEE Communications Letters, vol.9, issue.6, pp.570-572, 2005.
DOI : 10.1109/LCOMM.2005.1437374

]. H. Raz14, A. Razik, and . Hair, Self-Adaptive Security for Mobiles Agents, International Journal of Computer Applications, issue.13, p.94, 2014.

]. H. Reis00 and . Reiser, Security Requirements for Management Systems using Mobile Agents, proceeding of the Fifth IEEE Symposium on Computers and Communications: ISCC 2000, pp.160-165, 2000.

]. J. [-rio98, B. Riordan, and . Schneier, Environmental Key Generation Towards Clueless Agents, Mobile Agents and Security, p.1419, 1998.

]. T. Rober12 and . Robertazzi, Advanced Encryption Standard (AES), Basics of Computer Networking, pp.73-77, 2012.

]. V. Roth98 and . Roth, Mutual Protection of Co-operating Agents, Secure Internet Programming, pp.26-37, 1998.
DOI : 10.1007/3-540-48749-2_13

]. P. Sam01, S. Samarati, . Capitani, and . Vimercati, Access Control: Policies, Models, and Mechanisms, Foundations of Security Analysis and Design, pp.137-196, 2001.

]. T. San98, C. F. Sander, and . Tschudin, Protecting Mobile Agents Against Malicious Host, pp.44-60, 1998.

]. K. Scarf07, P. Scarfone, and . Mell, Guide to intrusion detection and prevention systems (idps, NIST special publication, vol.800, p.94, 2007.

]. C. Schn91 and . Schnorr, Efficient signature generation by smart cards, Journal of Cryptology, vol.3, issue.4, pp.161-174, 1991.

]. D. Scott04, A. Scott, A. Beresford, and . Mycroft, Spatial Security Policies for Mobile Agents in a Sentient Computing Environment, Lecture Notes in Computer Science, pp.302-9743, 2004.
DOI : 10.1007/3-540-36578-8_8

]. M. Sha06, J. Shao, and . Zhou, Protecting mobile-agent data collection against blocking attacks, Computer Standards & Interfaces, vol.28, issue.5, pp.600-611, 2006.

]. A. Sham79 and . Shamir, How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979.

]. A. Shi10, A. Shibli, S. Giambruno, and . Muftic, Security architecture and methodology for authorization of mobile agents, International Journal of Internet Technology and Secured Transactions, vol.2, pp.3-4, 2010.

F. B. Schneider, G. Morrisett, and R. Harper, A Language-Based Approach to Security, Informatics, 10 Years Ahead, pp.86-101, 2001.
DOI : 10.1007/3-540-44577-3_6

]. D. Smith10, Q. Smith, S. Guan, and . Fu, An Anomaly Detection Framework for Autonomic Management of Compute Cloud Systems, 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops, pp.376-381, 2010.
DOI : 10.1109/COMPSACW.2010.72

A. Soriano, E. J. Bernabeu, A. Valera, and M. Vallés, Multi-Agent Systems Platform for Mobile Robots Collision Avoidance, Advances on Practical Applications of Agents and Multi-Agent Systems, pp.320-323, 2013.
DOI : 10.1007/978-3-642-38073-0_37

]. S. Sri14, G. C. Srivastava, and . Nandi, Self-reliant mobile code: a new direction of agent security, Journal of Network and Computer Applications, vol.37, pp.62-75, 2014.

H. Tai and K. Kosaka, The Aglets project, Communications of the ACM, vol.42, issue.3, pp.100-101, 1999.
DOI : 10.1145/295685.295882

]. D. Talia11 and . Talia, Cloud Computing and Software Agents: Towards Cloud Intelligent Services, WOA, pp.2-6, 2011.

]. H. Tan02, L. Tan, and . Moreau, Extending Execution Tracing for Mobile Code Security, Proceedings of Second International Workshop on Security of Mobile Multi-Agents Systems (SEMAS'2002), pp.51-59, 2002.

]. A. Tanen07 and A. S. Tanenbaum, Modern Operating Systems, p.44, 2007.

]. C. Tau12, N. Tauro, S. Ganesan, A. Mishra, and . Bhagwat, Object Serialization: A Study of Techniques of Implementing Binary Serialization in C++, Java and. NET, International Journal of Computer Applications, vol.6, issue.45, 2012.

]. U. Tupak11, V. Tupakula, N. Varadharajan, and . Akku, Intrusion Detection Techniques for Infrastructure as a Service Cloud, IEEE International Conference on Dependable, Autonomic and Secure Computing, pp.744-751, 2011.

G. Vigna, Mobile agents and security, Edition, vol.1419, 2003.
DOI : 10.1007/3-540-68671-1

]. G. Vigna98 and . Vigna, Cryptographic Traces for Mobile Agents, Mobile agents and security, pp.137-153, 1998.
DOI : 10.1007/3-540-68671-1_8

]. G. Wro02 and . Wroblewski, General Method of Program Code Obfuscation, Institute of Engineering Cybernetics, 2002.

]. H. Xiong14 and . Xiong, Cost-effective scalable and anonymous certificateless remote authentication protocol". Information Forensics and Security, IEEE Transactions on, vol.9, issue.12, pp.2327-2339, 2014.

M. Zhang, A. Karmouch, and R. Impey, Towards a Secure Agent Platform Based on FIPA, Proceedings of the 3th International Workshop on Mobile Agents for Telecommunication Applications (MATA '01), pp.277-289, 2001.
DOI : 10.1007/3-540-44651-6_26

]. X. Zhan06, F. Zhang, R. Parisi-presicce, and . Sandhu, Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing, Advances in Information and Computer Security, pp.1611-3349, 2006.

]. Z. Zhao14 and . Zhao, An Efficient Anonymous Authentication Scheme for Wireless Body Area Networks Using Elliptic Curve Cryptosystem, Journal of Medical Systems, vol.37, issue.5, pp.1-7, 2014.
DOI : 10.1109/TCE.2013.6689679

H. Idrissi, A. Revel, and . Souidi, Security of Mobile Agent Platforms using RBAC based on Dynamic Role Assignment, International Journal of Security and Its Applications, vol.10, issue.4, pp.117-134, 2016.
DOI : 10.14257/ijsia.2016.10.4.13

URL : https://hal.archives-ouvertes.fr/hal-01356318

H. Idrissi and M. Ennahbaoui, Secure and Flexible RBAC Scheme Using Mobile Agents, Proceedings of the Mediterranean Conference on Information and Communication Technologies 2015, pp.447-455, 2016.
DOI : 10.1145/375735.376120

URL : https://hal.archives-ouvertes.fr/hal-01356333

H. Idrissi, M. Souidi, and A. Revel, Security of Mobile Agent Platforms Using Access Control and Cryptography, Agent and Multi-Agent Systems: Technologies and Applications, pp.27-39, 2015.
DOI : 10.1007/978-3-319-19728-9_3

URL : https://hal.archives-ouvertes.fr/hal-01356342

H. Idrissi, M. Souidi, and A. Revel, Mobile Agent Security Using ID-Based Agreement Protocol and Binary Serialization, International Journal of Security and Its Applications, vol.9, issue.5, pp.19-30, 2015.
DOI : 10.14257/ijsia.2015.9.5.02

URL : https://hal.archives-ouvertes.fr/hal-01226191

H. Idrissi and M. Ennahbaoui, Access control using mobile agents, 2014 International Conference on Multimedia Computing and Systems (ICMCS), pp.1216-1221, 2014.
DOI : 10.1109/ICMCS.2014.6911154

URL : https://hal.archives-ouvertes.fr/hal-01356357

H. Idrissi, A. Revel, and . Souidi, A New Approach based on Cryptography and XML Serialization for Mobile Agent Security, International Conference on Agents and Artificial Intelligence (ICAART), pp.403-411, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01356350