Security modeling and analysis of mobile agent systems /
A mobile agent system could be attacked by malicious agents, platforms and third parties. Mobile agents simply offer greater opportunities for abuse and misuse, which broadens the scale of threats significantly. In addition, since mobile agents have some unique characteristics such as their mobility...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
London ; Hackensack, NJ :
Imperial College Press,
©2006.
|
Colección: | Series in electrical and computer engineering ;
v. 5. |
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Cover
- Contents
- Preface
- 1 Introduction
- 1.1 Background
- 2 Mobile Agent System
- 2.1 Components of a Mobile Agent System
- 2.2 Characteristics and Advantages of a Mobile Agent System
- 3 Attacks and Countermeasures of Software System Security
- 3.1 General Security Objectives
- 3.2 Types of Attacks
- 3.2.1 Attacks against availability
- 3.2.2 Attacks against confidentiality
- 3.2.3 Attacks against integrity
- 3.2.4 Attacks against miscellaneous security objectives
- 3.3 Countermeasures of Attacks
- 3.3.1 Authentication
- 3.3.2 Access control
- 3.3.3 Audit and intrusion detection
- 3.3.4 Cryptography
- 3.3.5 Firewall
- 3.3.6 Anti-virus software
- 4 Security Issues in a Mobile Agent System
- 4.1 Security Issues in a Mobile Agent System
- 4.1.1 Possible attacks to a mobile agent system
- 4.1.2 Security requirements for a secure mobile agent system &