Fipa acl message structure specification . Foundation for Intelligent Physical Agents, 2002. ,
An Overview of Security Issues and Techniques in Mobile Agents, Communications and Multimedia Security, pp.59-78, 2005. ,
DOI : 10.1007/0-387-24486-7_5
Selfprotecting mobile agents obfuscation report, Network Associates Laboratories Report, 2003. ,
On the pseudo-random generator isaac, IACR Cryptology ePrint Archive, p.438, 2006. ,
Security for Mobile Agents: Issues and Challenges". Invited Chapter, the Book Handbook of Mobile Computing, I. Mahgoub, M. Ilyas, 2004. ,
JADE, Proceedings of the fifth international conference on Autonomous agents , AGENTS '01, pp.216-217, 2001. ,
DOI : 10.1145/375735.376120
Classification of Malicious Host Threats in Mobile Agent Computing South African Institute for Computer Scientists and Information Technologists, Proceedings of the 2002 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology, pp.141-148, 2002. ,
Shamir's Threshold Scheme, Encyclopedia of Cryptography and Security, pp.1193-1194, 2011. ,
DOI : 10.1007/0-387-23483-7_389
Safeguarding cryptographic keys, Proceedings of the national computer conference, pp.313-317, 1979. ,
Improving Network Intrusion Detection by Means of Domain-Aware Genetic Programming, 2010 International Conference on Availability, Reliability and Security, pp.327-332, 2010. ,
DOI : 10.1109/ARES.2010.53
A Snort-based mobile agent for a distributed intrusion detection system, IEEE Proceedings of the International Conference on Security and Cryptography (SECRYPT), pp.198-207, 2011. ,
URL : https://hal.archives-ouvertes.fr/lirmm-00798311
Mobile agents : Basic concepts, mobility models and the tracy toolkit, 2005. ,
Introduction aux agents: Principes et architecture des systèmes multi-agents". Collection IC2, 2001. ,
CloudSim:A toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms, Software: Practice and Experience, pp.23-50, 2010. ,
Universally Composable Notions of Key Exchange and Secure Channels, Advances in Cryptology, Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), 2002. ,
DOI : 10.1007/3-540-46035-7_22
Mobile agents in networking and distributed computing, 2012. ,
DOI : 10.1002/9781118135617
Research and Application of Mobile Agent in E-Commerce System, Applied Mechanics and Materials, pp.458-461, 2014. ,
DOI : 10.4028/www.scientific.net/AMM.519-520.458
A review of the applications of agent technology in traffic and transportation systems, IEEE Transactions on Intelligent Transport Systems, vol.2, issue.11, pp.485-497, 2010. ,
New directions in cryptography". Information Theory, IEEE Transactions on, vol.22, issue.6, pp.644-654, 1976. ,
Distributed intrusion detection in clouds using mobile agents, Third International Conference on Advanced Engineering Computing and Applications in Sciences, Sliema, pp.175-180, 2010. ,
Agents for games and simulations, Autonomous Agents and Multi-Agent Systems, vol.2, issue.24, pp.217-220, 2012. ,
US secure hash algorithm 1 (SHA1)". No. RFC 3174, 2001. ,
Bilinear pairings on elliptic curves". arXiv preprint, 2013. ,
Swot Analysis of access control models, International Journal of Security and Its Applications, vol.8, issue.3, pp.407-424, 2014. ,
Programmation répartie, optimisation par agent mobile, Thèse de doctorat, 2006. ,
Security for mobile agents: Authentication and state appraisal, Proceedings of the European Symposium on Research in Computer Security (ESORICS), pp.118-130, 1996. ,
On agent technology for e-commerce: trust, security and legal issues, The Knowledge Engineering Review, vol.22, issue.01, pp.3-35, 2007. ,
DOI : 10.1017/S0269888907001014
Multi-agent systems: an introduction to distributed artificial intelligence, 1999. ,
Making the Diffie-Hellman Protocol Identity-Based, Topics in Cryptology-CT-RSA Proceeding of the 10th Cryptographers' Track at the RSA Conference, 2010. ,
DOI : 10.1007/978-3-642-11925-5_12
Sony Network Breach Shows Amazon Clouds Appeal for Hackers Available: http : //www.bloomberg.com/news/2011 ? 05 ? 15/sony ? attack ? shows ? amazon ? s ? cloud ? service ? lures ? hackers ? at ? pennies ? an ? hour, html [Galla09] P. Gallagher. "Digital Signature Standard (DSS)". Federal Information Processing Standards Publication, FIPS PUB, 2009. ,
A mobile agent platform for distributed network and systems management, Journal of Systems and Software, vol.82, issue.2, pp.355-371, 2009. ,
DOI : 10.1016/j.jss.2008.06.034
Security Analysis of SHA-256 and Sisters, Selected Areas in Cryptography Proceedings of the 10th annual workshop, SAC, 2003. ,
DOI : 10.1007/978-3-540-24654-1_13
Information agents on the move, Software Focus, pp.31-36, 2001. ,
Mobile agents and security, IEEE Communications Magazine, vol.36, issue.7, pp.76-85, 1998. ,
DOI : 10.1109/35.689634
A secure execution framework for Java, Proceedings of the 7th ACM conference on Computer and communications security , CCS '00, pp.43-52, 2000. ,
DOI : 10.1145/352600.352608
A reliable protection architecture for mobile agents in open network system, International journal of computer applications, vol.17, issue.7, pp.6-14, 2011. ,
A New Approach based on Cryptography and XML Serialization for Mobile Agent Security, ICAART (1), pp.403-411, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01356350
Mobile Agent Security Using ID-Based Agreement Protocol and Binary Serialization, International Journal of Security and Its Applications, vol.9, issue.5, pp.19-30, 2015. ,
DOI : 10.14257/ijsia.2015.9.5.02
URL : https://hal.archives-ouvertes.fr/hal-01226191
Security of Mobile Agent Platforms Using Access Control and Cryptography, Agent and Multi-Agent Systems: Technologies and Applications, pp.27-39, 2015. ,
DOI : 10.1007/978-3-319-19728-9_3
URL : https://hal.archives-ouvertes.fr/hal-01356342
Mobile Agents with Cryptographic Traces For Intrusion Detection in the Cloud Computing, Procedia Computer Science, vol.73, pp.179-186, 2015. ,
DOI : 10.1016/j.procs.2015.12.010
A Secure Mobile Agents Platform, Journal of Communications, vol.3, issue.2, pp.1-12, 2008. ,
DOI : 10.4304/jcm.3.2.1-12
Detail Power Analysis of the SHA-3 Hashing Algorithm Candidates on Xilinx Spartan-3E, International Journal of Computer and Electrical Engineering, vol.4, issue.5, pp.410-413, 2013. ,
DOI : 10.7763/IJCEE.2013.V5.742
A comparison of mobile agent and client-server paradigms for information retrieval tasks in virtual enterprises, Proceedings Academia/Industry Working Conference on Research Challenges '00. Next Generation Enterprises: Virtual Organizations and Mobile/Pervasive Technologies. AIWORC'00. (Cat. No.PR00628), pp.209-213, 2000. ,
DOI : 10.1109/AIWORC.2000.843295
Mobile agent security". Technical report National Institute of Standards and Technology, Special Publication 800-19, 1999. ,
Elliptic curve cryptography, ACM Ubiquity, vol.9, issue.20, pp.20-26, 2008. ,
CIDS: A Framework for Intrusion Detection in Cloud Systems, 9th International Conference on Information Technology: New Generations (ITNG), pp.379-385, 2012. ,
Seven good reasons for mobile agents, Commun. ACM, ACM, vol.42, pp.88-89, 1999. ,
Anonymous authentication scheme for wireless communications, International Journal of Mobile Communications, vol.5, issue.5, pp.590-601, 2007. ,
DOI : 10.1504/IJMC.2007.013941
Data Acquisition System Research Based on Mobile Agent in Network Management, International Conference on Computer Science and Electronic Technology (ICCSET'14, 2015. ,
An efficient certificateless remote anonymous authentication scheme for wireless body area networks, 2012 IEEE International Conference on Communications (ICC), pp.332-342, 2014. ,
DOI : 10.1109/ICC.2012.6363786
Mobile agents for information retrieval in hybrid simulation environment, Journal of network and computer applications, pp.244-264, 2007. ,
Web site: http : //mrbool.com/dif f erences ? between ? binary ? serialization ? and ? serialization ? in ? javaIntroduction to Code Signing", (n.d.) From Microsoft Corporation, Microsoft Developer Network (MSDN) Web site:https : //msdn.microsof t.com/en ? us/library/ms537361%28v = vs.85%29.aspx [Madison03] "Signed Code Retrieved December 15Malware detection based on cloud computing integrating intrusion ontology representation, Introducing XML Serialization Differences between Binary Serialization and Serialization in Java IEEE Latin-American Conference on Communications (LATINCOM), pp.1-6, 2003. ,
Metasploit toolkit for penetration testing, exploit development, and vulnerability research, 2011. ,
The NIST definition of cloud computing". [Recommendations of the National Institute of Standards and Technology-Special Publication 800-145], Washington DC: NIST, 2011. ,
The MP architecture: towards a secure framework for mobile agents, International Journal of Agent-Oriented Software Engineering, vol.4, issue.4, pp.390-414, 2011. ,
DOI : 10.1504/IJAOSE.2011.043644
A Survey on Applications of Agent Technology in Industrial Process Control, IEEE Transactions on Industrial Informatics, vol.7, issue.4, pp.570-581, 2011. ,
DOI : 10.1109/TII.2011.2166781
Network time protocol version 4: Protocol and algorithms specification, No. RFC5905, 2010. ,
DOI : 10.17487/rfc5905
MASIF : The OMG Mobile Agent System Interoperability Facility, Personal and Ubiquitous Computing, pp.117-129, 1998. ,
Mobile objects and agents (moa), pp.595-610, 1999. ,
An overview of agent mobility in heterogeneous environments, Workshop Proceedings on Applications of Software Agents, p.52, 2011. ,
Evaluation of the RC4 algorithm for data encryption, IJCSA, vol.3, issue.2, pp.44-56, 2006. ,
A Dynamic Policy based Security Architecture for Mobile Agents". in "New Technologies , Mobility and Security, pp.493-505, 2007. ,
LIME, ACM Transactions on Software Engineering and Methodology, vol.15, issue.3, pp.279-328, 2006. ,
DOI : 10.1145/1151695.1151698
Proof-Carrying Code. Design and Implementation, pp.261-288 ,
DOI : 10.1007/978-94-010-0413-8_8
Safe, Untrusted Agents Using Proof-Carrying Code, pp.61-91, 1998. ,
Embedded Mobile Agent (EMA) for Distributed Information Retrieval, International Journal of Computer Science and Information Security, vol.13, issue.3, p.84, 2015. ,
Cross-platform generative agent migration, Proceedings of the Fourth European Symposium on Intelligent Technologies , Hybrid Systems and their implementation on Smart Adaptive Systems, pp.356-363, 2004. ,
Countering Security Vulnerabilities In Agent Execution Using A Self Executing Security, Proceeding of the 3rd International Joint conference on Autonomous Agents and Multi-Agents (AAMA2004), pp.1486-1487, 2004. ,
A survey of intrusion detection and prevention systems, Information Management & Computer Security, vol.18, issue.4, pp.277-290, 2010. ,
DOI : 10.1108/09685221011079199
Fixing the integrated diffie-hellman-DSA key exchange protocol, IEEE Communications Letters, vol.9, issue.6, pp.570-572, 2005. ,
DOI : 10.1109/LCOMM.2005.1437374
Self-Adaptive Security for Mobiles Agents, International Journal of Computer Applications, issue.13, p.94, 2014. ,
Security Requirements for Management Systems using Mobile Agents, proceeding of the Fifth IEEE Symposium on Computers and Communications: ISCC 2000, pp.160-165, 2000. ,
Environmental Key Generation Towards Clueless Agents, Mobile Agents and Security, p.1419, 1998. ,
Advanced Encryption Standard (AES), Basics of Computer Networking, pp.73-77, 2012. ,
Mutual Protection of Co-operating Agents, Secure Internet Programming, pp.26-37, 1998. ,
DOI : 10.1007/3-540-48749-2_13
Access Control: Policies, Models, and Mechanisms, Foundations of Security Analysis and Design, pp.137-196, 2001. ,
Protecting Mobile Agents Against Malicious Host, pp.44-60, 1998. ,
Guide to intrusion detection and prevention systems (idps, NIST special publication, vol.800, p.94, 2007. ,
Efficient signature generation by smart cards, Journal of Cryptology, vol.3, issue.4, pp.161-174, 1991. ,
Spatial Security Policies for Mobile Agents in a Sentient Computing Environment, Lecture Notes in Computer Science, pp.302-9743, 2004. ,
DOI : 10.1007/3-540-36578-8_8
Protecting mobile-agent data collection against blocking attacks, Computer Standards & Interfaces, vol.28, issue.5, pp.600-611, 2006. ,
How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979. ,
Security architecture and methodology for authorization of mobile agents, International Journal of Internet Technology and Secured Transactions, vol.2, pp.3-4, 2010. ,
A Language-Based Approach to Security, Informatics, 10 Years Ahead, pp.86-101, 2001. ,
DOI : 10.1007/3-540-44577-3_6
An Anomaly Detection Framework for Autonomic Management of Compute Cloud Systems, 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops, pp.376-381, 2010. ,
DOI : 10.1109/COMPSACW.2010.72
Multi-Agent Systems Platform for Mobile Robots Collision Avoidance, Advances on Practical Applications of Agents and Multi-Agent Systems, pp.320-323, 2013. ,
DOI : 10.1007/978-3-642-38073-0_37
Self-reliant mobile code: a new direction of agent security, Journal of Network and Computer Applications, vol.37, pp.62-75, 2014. ,
The Aglets project, Communications of the ACM, vol.42, issue.3, pp.100-101, 1999. ,
DOI : 10.1145/295685.295882
Cloud Computing and Software Agents: Towards Cloud Intelligent Services, WOA, pp.2-6, 2011. ,
Extending Execution Tracing for Mobile Code Security, Proceedings of Second International Workshop on Security of Mobile Multi-Agents Systems (SEMAS'2002), pp.51-59, 2002. ,
Modern Operating Systems, p.44, 2007. ,
Object Serialization: A Study of Techniques of Implementing Binary Serialization in C++, Java and. NET, International Journal of Computer Applications, vol.6, issue.45, 2012. ,
Intrusion Detection Techniques for Infrastructure as a Service Cloud, IEEE International Conference on Dependable, Autonomic and Secure Computing, pp.744-751, 2011. ,
Mobile agents and security, Edition, vol.1419, 2003. ,
DOI : 10.1007/3-540-68671-1
Cryptographic Traces for Mobile Agents, Mobile agents and security, pp.137-153, 1998. ,
DOI : 10.1007/3-540-68671-1_8
General Method of Program Code Obfuscation, Institute of Engineering Cybernetics, 2002. ,
Cost-effective scalable and anonymous certificateless remote authentication protocol". Information Forensics and Security, IEEE Transactions on, vol.9, issue.12, pp.2327-2339, 2014. ,
Towards a Secure Agent Platform Based on FIPA, Proceedings of the 3th International Workshop on Mobile Agents for Telecommunication Applications (MATA '01), pp.277-289, 2001. ,
DOI : 10.1007/3-540-44651-6_26
Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing, Advances in Information and Computer Security, pp.1611-3349, 2006. ,
An Efficient Anonymous Authentication Scheme for Wireless Body Area Networks Using Elliptic Curve Cryptosystem, Journal of Medical Systems, vol.37, issue.5, pp.1-7, 2014. ,
DOI : 10.1109/TCE.2013.6689679
Security of Mobile Agent Platforms using RBAC based on Dynamic Role Assignment, International Journal of Security and Its Applications, vol.10, issue.4, pp.117-134, 2016. ,
DOI : 10.14257/ijsia.2016.10.4.13
URL : https://hal.archives-ouvertes.fr/hal-01356318
Secure and Flexible RBAC Scheme Using Mobile Agents, Proceedings of the Mediterranean Conference on Information and Communication Technologies 2015, pp.447-455, 2016. ,
DOI : 10.1145/375735.376120
URL : https://hal.archives-ouvertes.fr/hal-01356333
Security of Mobile Agent Platforms Using Access Control and Cryptography, Agent and Multi-Agent Systems: Technologies and Applications, pp.27-39, 2015. ,
DOI : 10.1007/978-3-319-19728-9_3
URL : https://hal.archives-ouvertes.fr/hal-01356342
Mobile Agent Security Using ID-Based Agreement Protocol and Binary Serialization, International Journal of Security and Its Applications, vol.9, issue.5, pp.19-30, 2015. ,
DOI : 10.14257/ijsia.2015.9.5.02
URL : https://hal.archives-ouvertes.fr/hal-01226191
Access control using mobile agents, 2014 International Conference on Multimedia Computing and Systems (ICMCS), pp.1216-1221, 2014. ,
DOI : 10.1109/ICMCS.2014.6911154
URL : https://hal.archives-ouvertes.fr/hal-01356357
A New Approach based on Cryptography and XML Serialization for Mobile Agent Security, International Conference on Agents and Artificial Intelligence (ICAART), pp.403-411, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01356350