Path-based Security for Mobile Agents

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Path-Based Security for Mobile Agents

As mobile agents are increasingly adopted in intranets, on the Internet, and on computational grids, new security concerns become increasingly important. Unlike other kinds of mobile code, such as applets, which are pulled a single time to remote systems (single-hop), mobile agents may move using their own itinerary through a series of systems (multiple-hop), potentially carrying sensitive info...

متن کامل

Mobile Agents and Security

Mobile agent technology offers a new computing paradigm in which a software agent can suspend its execution on a host computer, transfer itself to another agent-enabled host on the network, and resume execution on the new host. The use of mobile code has a long history dating back to the use of remote job entry systems in the 1960's. Today's agent incarnations can be characterized in a number o...

متن کامل

Security of Mobile Agents

The Internet is continuously extending to mobile devices. This implies that applications should be tailored to make efficient use of the limited resources of such devices. Mobile agents are a promising solution for this purpose. However, secure protocols are required in order to assure confidentiality and integrity of the data such an agent collects. This paper describes 6 such security protoco...

متن کامل

Cryptography Based Hybrid Security Architecture for Mobile Multi Agents

Distributed Computing is the current area of research. Many researchers are working in area of Distributed Computing and trying to find a solution for the security and other issues. In Distributed Computing the mobile agents are the very important thing. When different mobile agents work in the same environment simultaneously it becomes a very important issue. Mobile agents have automatic, pro-...

متن کامل

Mobile Security Agents for Network Traffic Analysis

This paper describes the implementation of a distributed agent architecture for intrusion detection and response in networked computers. Unlike conventional intrusion detection systems (IDS), this security system attempts to emulate mechanisms of the natural immune system using Java-based mobile software agents. These security agents monitor multiple levels (packet, process, system, and user) o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Electronic Notes in Theoretical Computer Science

سال: 2002

ISSN: 1571-0661

DOI: 10.1016/s1571-0661(04)80340-2