|
|
|
|
LEADER |
00000cam a2200000Ma 4500 |
001 |
EBSCO_ocn560444805 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
061018s2006 enka ob 001 0 eng d |
010 |
|
|
|z 2006284178
|
040 |
|
|
|a MERUC
|b eng
|e pn
|c MERUC
|d CCO
|d E7B
|d OCLCQ
|d COCUF
|d N$T
|d YDXCP
|d OCLCQ
|d UV0
|d IDEBK
|d FVL
|d OCLCQ
|d OCLCF
|d OCLCQ
|d OCLCO
|d OCLCQ
|d AZK
|d AGLDB
|d OCLCQ
|d MOR
|d PIFAG
|d OCLCQ
|d U3W
|d STF
|d WRM
|d OCLCQ
|d VTS
|d NRAMU
|d INT
|d VT2
|d OCLCQ
|d WYU
|d OCLCQ
|d M8D
|d UKAHL
|d LEAUB
|d UKCRE
|d VLY
|d OCLCA
|d OCLCO
|d OCLCQ
|d INARC
|
015 |
|
|
|a GBA660259
|2 bnb
|
016 |
7 |
|
|a 013501786
|2 Uk
|
019 |
|
|
|a 181201967
|a 305126123
|a 335627393
|a 647682781
|a 722614482
|a 728032601
|a 748525321
|a 961585815
|a 962558625
|a 988523393
|a 992106671
|a 1037691536
|a 1038619483
|a 1045440727
|a 1055344935
|a 1064034245
|a 1081290732
|a 1086444826
|a 1153528514
|a 1162445558
|a 1228566103
|a 1290104067
|a 1300679923
|a 1392118789
|
020 |
|
|
|a 1860949053
|q (electronic bk.)
|
020 |
|
|
|a 9781860949050
|q (electronic bk.)
|
020 |
|
|
|z 9781860946349
|
020 |
|
|
|z 9781860949050
|
020 |
|
|
|z 1860946348
|
020 |
|
|
|a 1281347558
|
020 |
|
|
|a 9781281347558
|
020 |
|
|
|a 9786611347550
|
020 |
|
|
|a 6611347550
|
029 |
1 |
|
|a AU@
|b 000051410847
|
029 |
1 |
|
|a DEBBG
|b BV042962944
|
029 |
1 |
|
|a DEBSZ
|b 422168297
|
029 |
1 |
|
|a GBVCP
|b 799421995
|
029 |
1 |
|
|a NZ1
|b 12551491
|
035 |
|
|
|a (OCoLC)560444805
|z (OCoLC)181201967
|z (OCoLC)305126123
|z (OCoLC)335627393
|z (OCoLC)647682781
|z (OCoLC)722614482
|z (OCoLC)728032601
|z (OCoLC)748525321
|z (OCoLC)961585815
|z (OCoLC)962558625
|z (OCoLC)988523393
|z (OCoLC)992106671
|z (OCoLC)1037691536
|z (OCoLC)1038619483
|z (OCoLC)1045440727
|z (OCoLC)1055344935
|z (OCoLC)1064034245
|z (OCoLC)1081290732
|z (OCoLC)1086444826
|z (OCoLC)1153528514
|z (OCoLC)1162445558
|z (OCoLC)1228566103
|z (OCoLC)1290104067
|z (OCoLC)1300679923
|z (OCoLC)1392118789
|
050 |
|
4 |
|a QA76.76.I58
|b M315 2006eb
|
072 |
|
7 |
|a COM
|x 005030
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 004000
|2 bisacsh
|
072 |
|
7 |
|a UYQ
|2 bicssc
|
082 |
0 |
4 |
|a 006.3
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Ma, Lu.
|
245 |
1 |
0 |
|a Security modeling and analysis of mobile agent systems /
|c Lu Ma, Jeffrey J.P. Tsai.
|
260 |
|
|
|a London ;
|a Hackensack, NJ :
|b Imperial College Press,
|c ©2006.
|
300 |
|
|
|a 1 online resource (xii, 200 pages) :
|b illustrations.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Series in electrical and computer engineering ;
|v v. 5
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Cover -- Contents -- Preface -- 1 Introduction -- 1.1 Background -- 2 Mobile Agent System -- 2.1 Components of a Mobile Agent System -- 2.2 Characteristics and Advantages of a Mobile Agent System -- 3 Attacks and Countermeasures of Software System Security -- 3.1 General Security Objectives -- 3.2 Types of Attacks -- 3.2.1 Attacks against availability -- 3.2.2 Attacks against confidentiality -- 3.2.3 Attacks against integrity -- 3.2.4 Attacks against miscellaneous security objectives -- 3.3 Countermeasures of Attacks -- 3.3.1 Authentication -- 3.3.2 Access control -- 3.3.3 Audit and intrusion detection -- 3.3.4 Cryptography -- 3.3.5 Firewall -- 3.3.6 Anti-virus software -- 4 Security Issues in a Mobile Agent System -- 4.1 Security Issues in a Mobile Agent System -- 4.1.1 Possible attacks to a mobile agent system -- 4.1.2 Security requirements for a secure mobile agent system &
|
520 |
|
|
|a A mobile agent system could be attacked by malicious agents, platforms and third parties. Mobile agents simply offer greater opportunities for abuse and misuse, which broadens the scale of threats significantly. In addition, since mobile agents have some unique characteristics such as their mobility, security problems have become more complicated in these systems. These security problems have become a bottleneck in the development and maintenance of mobile agent systems, especially in security sensitive applications such as electronic commerce. This book introduces the concept and structure of mobile agent systems and discusses various attacks and countermeasures. The emphasis is on the formal modeling and analysis of secure mobile agent systems and their applications.
|
588 |
0 |
|
|a Print version record.
|
546 |
|
|
|a English.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Mobile agents (Computer software)
|
650 |
|
0 |
|a Intelligent agents (Computer software)
|
650 |
|
6 |
|a Agents mobiles (Logiciels)
|
650 |
|
6 |
|a Agents intelligents (Logiciels)
|
650 |
|
7 |
|a COMPUTERS
|x Enterprise Applications
|x Business Intelligence Tools.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Intelligence (AI) & Semantics.
|2 bisacsh
|
650 |
|
7 |
|a Intelligent agents (Computer software)
|2 fast
|0 (OCoLC)fst00975909
|
650 |
|
7 |
|a Mobile agents (Computer software)
|2 fast
|0 (OCoLC)fst01024205
|
700 |
1 |
|
|a Tsai, Jeffrey J.-P.
|
776 |
0 |
8 |
|i Print version:
|a Ma, Lu.
|t Security modeling and analysis of mobile agent systems.
|d London ; Hackensack, NJ : Imperial College Press, ©2006
|w (DLC) 2006284178
|
830 |
|
0 |
|a Series in electrical and computer engineering ;
|v v. 5.
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=210607
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH24683069
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10201142
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 210607
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n 134755
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2733635
|
938 |
|
|
|a Internet Archive
|b INAR
|n securitymodeling0000malu
|
994 |
|
|
|a 92
|b IZTAP
|