Limit search to items available for checkout
E-BOOK
Author Ma, Lu.
Title Security modeling and analysis of mobile agent systems / Lu Ma, Jeffrey J.P. Tsai.
Imprint London ; Hackensack, NJ : Imperial College Press, ©2006.

Copies/Volumes

LOCATION CALL # STATUS
 Internet  Electronic Book    AVAILABLE
Description 1 online resource (xii, 200 pages) : illustrations.
Series Series in electrical and computer engineering ; v. 5.
Series in electrical and computer engineering ; v. 5.
Bibliog. Includes bibliographical references and index.
Note Available only to authorized UTEP users.
Print version record.
Subject Mobile agents (Computer software)
Intelligent agents (Computer software)
Contents Cover -- Contents -- Preface -- 1 Introduction -- 1.1 Background -- 2 Mobile Agent System -- 2.1 Components of a Mobile Agent System -- 2.2 Characteristics and Advantages of a Mobile Agent System -- 3 Attacks and Countermeasures of Software System Security -- 3.1 General Security Objectives -- 3.2 Types of Attacks -- 3.2.1 Attacks against availability -- 3.2.2 Attacks against confidentiality -- 3.2.3 Attacks against integrity -- 3.2.4 Attacks against miscellaneous security objectives -- 3.3 Countermeasures of Attacks -- 3.3.1 Authentication -- 3.3.2 Access control -- 3.3.3 Audit and intrusion detection -- 3.3.4 Cryptography -- 3.3.5 Firewall -- 3.3.6 Anti-virus software -- 4 Security Issues in a Mobile Agent System -- 4.1 Security Issues in a Mobile Agent System -- 4.1.1 Possible attacks to a mobile agent system -- 4.1.2 Security requirements for a secure mobile agent system &
Summary A mobile agent system could be attacked by malicious agents, platforms and third parties. Mobile agents simply offer greater opportunities for abuse and misuse, which broadens the scale of threats significantly. In addition, since mobile agents have some unique characteristics such as their mobility, security problems have become more complicated in these systems. These security problems have become a bottleneck in the development and maintenance of mobile agent systems, especially in security sensitive applications such as electronic commerce. This book introduces the concept and structure of mobile agent systems and discusses various attacks and countermeasures. The emphasis is on the formal modeling and analysis of secure mobile agent systems and their applications.
Other Author Tsai, Jeffrey J.-P.
Other Title Print version: Ma, Lu. Security modeling and analysis of mobile agent systems. London ; Hackensack, NJ : Imperial College Press, ©2006