05162nam 2200673Ia 450 991077701630332120230828231540.01-281-34755-897866113475501-86094-905-3(CKB)1000000000415414(EBL)1679468(OCoLC)815568136(SSID)ssj0000243267(PQKBManifestationID)12076320(PQKBTitleCode)TC0000243267(PQKBWorkID)10321644(PQKB)10706987(MiAaPQ)EBC1679468(WSP)0000P435(Au-PeEL)EBL1679468(CaPaEBR)ebr10201142(CaONFJC)MIL134755(EXLCZ)99100000000041541420061018d2006 uy 0engur|n|---|||||txtccrSecurity modeling and analysis of mobile agent systems[electronic resource] /Lu Ma, Jeffrey J.P. TsaiLondon ;Hackensack, NJ Imperial College Pressc20061 online resource (214 p.)Series in electrical and computer engineering ;v. 5Description based upon print version of record.1-86094-634-8 Includes bibliographical references and index.Contents ; Preface ; 1 Introduction ; 1.1 Background ; 2 Mobile Agent System ; 2.1 Components of a Mobile Agent System ; 2.2 Characteristics and Advantages of a Mobile Agent System ; 3 Attacks and Countermeasures of Software System Security ; 3.1 General Security Objectives3.2 Types of Attacks 3.2.1 Attacks against availability ; 3.2.2 Attacks against confidentiality ; 3.2.3 Attacks against integrity ; 3.2.4 Attacks against miscellaneous security objectives ; 3.3 Countermeasures of Attacks ; 3.3.1 Authentication ; 3.3.2 Access control3.3.3 Audit and intrusion detection 3.3.4 Cryptography ; 3.3.5 Firewall ; 3.3.6 Anti-virus software ; 4 Security Issues in a Mobile Agent System ; 4.1 Security Issues in a Mobile Agent System ; 4.1.1 Possible attacks to a mobile agent system4.1.1.1 Possible attacks to a mobile agent 4.1.1.2 Possible attacks to a mobile agent platform ; 4.1.2 Security requirements for a secure mobile agent system ; 4.2 Related Works ; 4.2.1 Existing mobile agent systems ; 4.2.2 Security research4.2.2.1 Security measures for a mobile agent platform 4.2.2.2 Security measures for a mobile agent ; 4.2.3 Mobility modeling ; 4.2.4 Conclusions ; 5 A New Formal Model - Extended Elementary Object System (EEOS) ; 5.1 Object-Oriented Technology and Petri Nets5.2 Elementary Object System (EOS) A mobile agent system could be attacked by malicious agents, platforms and third parties. Mobile agents simply offer greater opportunities for abuse and misuse, which broadens the scale of threats significantly. In addition, since mobile agents have some unique characteristics such as their mobility, security problems have become more complicated in these systems. These security problems have become a bottleneck in the development and maintenance of mobile agent systems, especially in security sensitive applications such as electronic commerce. This book introduces the concept and structure oSeries in electrical and computer engineering ;v. 5.Mobile agents (Computer software)Intelligent agents (Computer software)Mobile agents (Computer software)Intelligent agents (Computer software)006.3Ma Lu1557875Tsai Jeffrey J.-P1484382MiAaPQMiAaPQMiAaPQBOOK9910777016303321Security modeling and analysis of mobile agent systems3821841UNINA