Application Research On the Mobile Agent Security
نویسندگان
چکیده
منابع مشابه
Application Security Models for Mobile Agent Systems
Mobile agents are a distributed computing paradigm based on mobile autonomous programs. Mobile applications must balance security requirements with available security mechanisms in order to meet application level security goals. We introduce a trust framework to reason about application security requirements, trust expression, and agent protection mechanisms. We develop application security mod...
متن کاملMobile Agent Security
Mobile agent technology is a new paradigm of distributed computing that can replace the conventional client-server model. However, it has not become popular due to some problems such as security. Threats to mobile agent security generally fall into three main classes: disclosure of information, denial of service, and corruption of information. Four threat categories are identified: threats stem...
متن کاملMobile agent security
The agent paradigm is currently attracting much research. A mobile agent is a particular type of agent with the ability to migrate from one host to another where it can resume its execution. In this article we consider security issues that need to be addressed before multi-agent systems in general, and mobile agents in particular, can be a viable solution for a broad range of commercial applica...
متن کاملPortable Resource Control in Java: Application to Mobile Agent Security
Prevention of denial-of-service attacks is indispensable for distributed agent systems to execute securely. To implement the required defense mechanisms, it is necessary to have support for resource control, i.e., accounting and limiting the consumption of resources like CPU, memory, and threads. Java is the predominant implementation language for mobile agent systems, even though resource cont...
متن کاملEncrypting Java Archives and Its Application to Mobile Agent Security
In this article we describe an extension of Java Archives that allows to keep data encrypted for multiple recipients. Encrypted data is accessible only by selected access groups. Java archives may be used as containers of mobile agents, which allows agents to keep confidential data unaccessible while residing on untrusted hosts. However, additional protective measures are required in order to p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Energy Procedia
سال: 2011
ISSN: 1876-6102
DOI: 10.1016/j.egypro.2011.10.797