Path-based Security for Mobile Agents
نویسندگان
چکیده
منابع مشابه
Path-Based Security for Mobile Agents
As mobile agents are increasingly adopted in intranets, on the Internet, and on computational grids, new security concerns become increasingly important. Unlike other kinds of mobile code, such as applets, which are pulled a single time to remote systems (single-hop), mobile agents may move using their own itinerary through a series of systems (multiple-hop), potentially carrying sensitive info...
متن کاملMobile Agents and Security
Mobile agent technology offers a new computing paradigm in which a software agent can suspend its execution on a host computer, transfer itself to another agent-enabled host on the network, and resume execution on the new host. The use of mobile code has a long history dating back to the use of remote job entry systems in the 1960's. Today's agent incarnations can be characterized in a number o...
متن کاملSecurity of Mobile Agents
The Internet is continuously extending to mobile devices. This implies that applications should be tailored to make efficient use of the limited resources of such devices. Mobile agents are a promising solution for this purpose. However, secure protocols are required in order to assure confidentiality and integrity of the data such an agent collects. This paper describes 6 such security protoco...
متن کاملCryptography Based Hybrid Security Architecture for Mobile Multi Agents
Distributed Computing is the current area of research. Many researchers are working in area of Distributed Computing and trying to find a solution for the security and other issues. In Distributed Computing the mobile agents are the very important thing. When different mobile agents work in the same environment simultaneously it becomes a very important issue. Mobile agents have automatic, pro-...
متن کاملMobile Security Agents for Network Traffic Analysis
This paper describes the implementation of a distributed agent architecture for intrusion detection and response in networked computers. Unlike conventional intrusion detection systems (IDS), this security system attempts to emulate mechanisms of the natural immune system using Java-based mobile software agents. These security agents monitor multiple levels (packet, process, system, and user) o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronic Notes in Theoretical Computer Science
سال: 2002
ISSN: 1571-0661
DOI: 10.1016/s1571-0661(04)80340-2