A specialised architecture for embedding trust evaluation capabilities in intelligent mobile agents

Justin R. Pike, Elizabeth M. Ehlers, Ockmer L. Oosthuizen

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)

Abstract

This paper proposes an approach to enhancing mobile agent protection. Mobile agents may come under threat from malicious hosts and unscrupulous agents. In an effort to reduce risk for mobile agents and improve the robustness of mobile agent systems - the proposed trust-based approach could be used to augment existing mechanisms aimed at mobile agent protection. The approach involves the development of a component that embeds an intelligent trust evaluation capability in a participating agent. This allows user agents to delegate the task of trust evaluation to specialised evaluator agents. These evaluator agents are a simple add-on to mobile agent systems - eliminating the need to redevelop mobile agent systems.

Original languageEnglish
Title of host publicationAgent Computing and Multi-Agent Systems - 10th Pacific Rim International Conference on Multi-Agents, PRIMA 2007, Revised Papers
Pages404-409
Number of pages6
DOIs
Publication statusPublished - 2009
Event10th Pacific Rim International Conference on Multi-Agents, PRIMA 2007 - Bangkok, Thailand
Duration: 21 Nov 200723 Nov 2007

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5044 LNAI
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference10th Pacific Rim International Conference on Multi-Agents, PRIMA 2007
Country/TerritoryThailand
CityBangkok
Period21/11/0723/11/07

Keywords

  • Agent Architectures
  • Applications
  • Mobile Agents
  • Trust

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'A specialised architecture for embedding trust evaluation capabilities in intelligent mobile agents'. Together they form a unique fingerprint.

Cite this