Cargando…

Security modeling and analysis of mobile agent systems /

A mobile agent system could be attacked by malicious agents, platforms and third parties. Mobile agents simply offer greater opportunities for abuse and misuse, which broadens the scale of threats significantly. In addition, since mobile agents have some unique characteristics such as their mobility...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Ma, Lu
Otros Autores: Tsai, Jeffrey J.-P
Formato: Electrónico eBook
Idioma:Inglés
Publicado: London ; Hackensack, NJ : Imperial College Press, ©2006.
Colección:Series in electrical and computer engineering ; v. 5.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ma 4500
001 EBSCO_ocn560444805
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 061018s2006 enka ob 001 0 eng d
010 |z  2006284178 
040 |a MERUC  |b eng  |e pn  |c MERUC  |d CCO  |d E7B  |d OCLCQ  |d COCUF  |d N$T  |d YDXCP  |d OCLCQ  |d UV0  |d IDEBK  |d FVL  |d OCLCQ  |d OCLCF  |d OCLCQ  |d OCLCO  |d OCLCQ  |d AZK  |d AGLDB  |d OCLCQ  |d MOR  |d PIFAG  |d OCLCQ  |d U3W  |d STF  |d WRM  |d OCLCQ  |d VTS  |d NRAMU  |d INT  |d VT2  |d OCLCQ  |d WYU  |d OCLCQ  |d M8D  |d UKAHL  |d LEAUB  |d UKCRE  |d VLY  |d OCLCA  |d OCLCO  |d OCLCQ  |d INARC 
015 |a GBA660259  |2 bnb 
016 7 |a 013501786  |2 Uk 
019 |a 181201967  |a 305126123  |a 335627393  |a 647682781  |a 722614482  |a 728032601  |a 748525321  |a 961585815  |a 962558625  |a 988523393  |a 992106671  |a 1037691536  |a 1038619483  |a 1045440727  |a 1055344935  |a 1064034245  |a 1081290732  |a 1086444826  |a 1153528514  |a 1162445558  |a 1228566103  |a 1290104067  |a 1300679923  |a 1392118789 
020 |a 1860949053  |q (electronic bk.) 
020 |a 9781860949050  |q (electronic bk.) 
020 |z 9781860946349 
020 |z 9781860949050 
020 |z 1860946348 
020 |a 1281347558 
020 |a 9781281347558 
020 |a 9786611347550 
020 |a 6611347550 
029 1 |a AU@  |b 000051410847 
029 1 |a DEBBG  |b BV042962944 
029 1 |a DEBSZ  |b 422168297 
029 1 |a GBVCP  |b 799421995 
029 1 |a NZ1  |b 12551491 
035 |a (OCoLC)560444805  |z (OCoLC)181201967  |z (OCoLC)305126123  |z (OCoLC)335627393  |z (OCoLC)647682781  |z (OCoLC)722614482  |z (OCoLC)728032601  |z (OCoLC)748525321  |z (OCoLC)961585815  |z (OCoLC)962558625  |z (OCoLC)988523393  |z (OCoLC)992106671  |z (OCoLC)1037691536  |z (OCoLC)1038619483  |z (OCoLC)1045440727  |z (OCoLC)1055344935  |z (OCoLC)1064034245  |z (OCoLC)1081290732  |z (OCoLC)1086444826  |z (OCoLC)1153528514  |z (OCoLC)1162445558  |z (OCoLC)1228566103  |z (OCoLC)1290104067  |z (OCoLC)1300679923  |z (OCoLC)1392118789 
050 4 |a QA76.76.I58  |b M315 2006eb 
072 7 |a COM  |x 005030  |2 bisacsh 
072 7 |a COM  |x 004000  |2 bisacsh 
072 7 |a UYQ  |2 bicssc 
082 0 4 |a 006.3  |2 22 
049 |a UAMI 
100 1 |a Ma, Lu. 
245 1 0 |a Security modeling and analysis of mobile agent systems /  |c Lu Ma, Jeffrey J.P. Tsai. 
260 |a London ;  |a Hackensack, NJ :  |b Imperial College Press,  |c ©2006. 
300 |a 1 online resource (xii, 200 pages) :  |b illustrations. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Series in electrical and computer engineering ;  |v v. 5 
504 |a Includes bibliographical references and index. 
505 0 |a Cover -- Contents -- Preface -- 1 Introduction -- 1.1 Background -- 2 Mobile Agent System -- 2.1 Components of a Mobile Agent System -- 2.2 Characteristics and Advantages of a Mobile Agent System -- 3 Attacks and Countermeasures of Software System Security -- 3.1 General Security Objectives -- 3.2 Types of Attacks -- 3.2.1 Attacks against availability -- 3.2.2 Attacks against confidentiality -- 3.2.3 Attacks against integrity -- 3.2.4 Attacks against miscellaneous security objectives -- 3.3 Countermeasures of Attacks -- 3.3.1 Authentication -- 3.3.2 Access control -- 3.3.3 Audit and intrusion detection -- 3.3.4 Cryptography -- 3.3.5 Firewall -- 3.3.6 Anti-virus software -- 4 Security Issues in a Mobile Agent System -- 4.1 Security Issues in a Mobile Agent System -- 4.1.1 Possible attacks to a mobile agent system -- 4.1.2 Security requirements for a secure mobile agent system & 
520 |a A mobile agent system could be attacked by malicious agents, platforms and third parties. Mobile agents simply offer greater opportunities for abuse and misuse, which broadens the scale of threats significantly. In addition, since mobile agents have some unique characteristics such as their mobility, security problems have become more complicated in these systems. These security problems have become a bottleneck in the development and maintenance of mobile agent systems, especially in security sensitive applications such as electronic commerce. This book introduces the concept and structure of mobile agent systems and discusses various attacks and countermeasures. The emphasis is on the formal modeling and analysis of secure mobile agent systems and their applications. 
588 0 |a Print version record. 
546 |a English. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Mobile agents (Computer software) 
650 0 |a Intelligent agents (Computer software) 
650 6 |a Agents mobiles (Logiciels) 
650 6 |a Agents intelligents (Logiciels) 
650 7 |a COMPUTERS  |x Enterprise Applications  |x Business Intelligence Tools.  |2 bisacsh 
650 7 |a COMPUTERS  |x Intelligence (AI) & Semantics.  |2 bisacsh 
650 7 |a Intelligent agents (Computer software)  |2 fast  |0 (OCoLC)fst00975909 
650 7 |a Mobile agents (Computer software)  |2 fast  |0 (OCoLC)fst01024205 
700 1 |a Tsai, Jeffrey J.-P. 
776 0 8 |i Print version:  |a Ma, Lu.  |t Security modeling and analysis of mobile agent systems.  |d London ; Hackensack, NJ : Imperial College Press, ©2006  |w (DLC) 2006284178 
830 0 |a Series in electrical and computer engineering ;  |v v. 5. 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=210607  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH24683069 
938 |a ebrary  |b EBRY  |n ebr10201142 
938 |a EBSCOhost  |b EBSC  |n 210607 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n 134755 
938 |a YBP Library Services  |b YANK  |n 2733635 
938 |a Internet Archive  |b INAR  |n securitymodeling0000malu 
994 |a 92  |b IZTAP