Protecting Mobile Livelihoods

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Protecting Mobile Agents through Tracing

Mobile code systems provide a exible and powerful platform to build distributed applications in an Internet scale, but they rise strong requirements from the security point of view. Security issues include authentication of the di erent remote parties involved and protection of the execution environments from malicious agents. Nonetheless, the most di cult task is to protect roaming agents from...

متن کامل

PROTECTING MOVING TARGETS WITH MULTIPLE MOBILE RESOURCES Protecting Moving Targets with Multiple Mobile Resources

In recent years, Stackelberg Security Games have been successfully applied to solve resource allocation and scheduling problems in several security domains. However, previous work has mostly assumed that the targets are stationary relative to the defender and the attacker, leading to discrete game models with finite numbers of pure strategies. This paper in contrast focuses on protecting mobile...

متن کامل

Protecting a Mobile Agent's Route against Collusions

In the world of mobile agents, security aspects are extensively being discussed, with strong emphasis on how agents can be protected against malicious hosts and vice versa. This paper discusses a method for concealing an agent's route information from being misused by sites en route to collect proole information of the agent's owner. Furthermore , it is shown that the protected route resists at...

متن کامل

Protecting Competitive Negotiation of Mobile Agents

The paradigm of mobile agents reached its popularity and attraction from typical application scenarios, which are located in the area of electronic commerce. In these common application scenarios, mobile agents get a task from its owner to buy certain goods. To fulfill this task, the agent wanders to various merchants and collects information about the different offers. In this paper we present...

متن کامل

Self - Protecting Mobile Agents Obfuscation Report

This document describes our investigation into software obfuscation for building SelfProtecting Mobile Agents (SPMA). The original goal of the SPMA project was to develop automated tools to protect mobile agents from attacks by malicious hosts. In development of those tools, we realized obfuscation could not be relied upon to give a reasonable amount of security. Because of this, we redirected ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Modern China

سال: 2012

ISSN: 0097-7004,1552-6836

DOI: 10.1177/0097700411435765