LEADER 00779cam0 2200241 450 001 E600200037235 005 20210204160425.0 100 $a20080526d1992 |||||ita|0103 ba 101 $aeng 102 $aGB 200 1 $aMax Weber from history to modernity$fBryan S. Turner 210 $aLondon and New York$cRoutledge$d1992 215 $aX, 272 p.$d21 cm. 700 1$aTurner$b, Bryan S.$3A600200048063$4070$0125145 801 0$aIT$bUNISOB$c20210204$gRICA 850 $aUNISOB 852 $aUNISOB$j300$m72431 912 $aE600200037235 940 $aM 102 Monografia moderna SBN 941 $aM 957 $a300$b002395$gSi$d72431$1massimo$2UNISOB$3UNISOB$420080526072008.0$520190717120435.0$6Spinosa 996 $aMax Weber from history to modernity$91685660 997 $aUNISOB LEADER 05162nam 2200673Ia 450 001 9910777016303321 005 20230828231540.0 010 $a1-281-34755-8 010 $a9786611347550 010 $a1-86094-905-3 035 $a(CKB)1000000000415414 035 $a(EBL)1679468 035 $a(OCoLC)815568136 035 $a(SSID)ssj0000243267 035 $a(PQKBManifestationID)12076320 035 $a(PQKBTitleCode)TC0000243267 035 $a(PQKBWorkID)10321644 035 $a(PQKB)10706987 035 $a(MiAaPQ)EBC1679468 035 $a(WSP)0000P435 035 $a(Au-PeEL)EBL1679468 035 $a(CaPaEBR)ebr10201142 035 $a(CaONFJC)MIL134755 035 $a(EXLCZ)991000000000415414 100 $a20061018d2006 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aSecurity modeling and analysis of mobile agent systems$b[electronic resource] /$fLu Ma, Jeffrey J.P. Tsai 210 $aLondon ;$aHackensack, NJ $cImperial College Press$dc2006 215 $a1 online resource (214 p.) 225 1 $aSeries in electrical and computer engineering ;$vv. 5 300 $aDescription based upon print version of record. 311 $a1-86094-634-8 320 $aIncludes bibliographical references and index. 327 $aContents ; Preface ; 1 Introduction ; 1.1 Background ; 2 Mobile Agent System ; 2.1 Components of a Mobile Agent System ; 2.2 Characteristics and Advantages of a Mobile Agent System ; 3 Attacks and Countermeasures of Software System Security ; 3.1 General Security Objectives 327 $a3.2 Types of Attacks 3.2.1 Attacks against availability ; 3.2.2 Attacks against confidentiality ; 3.2.3 Attacks against integrity ; 3.2.4 Attacks against miscellaneous security objectives ; 3.3 Countermeasures of Attacks ; 3.3.1 Authentication ; 3.3.2 Access control 327 $a3.3.3 Audit and intrusion detection 3.3.4 Cryptography ; 3.3.5 Firewall ; 3.3.6 Anti-virus software ; 4 Security Issues in a Mobile Agent System ; 4.1 Security Issues in a Mobile Agent System ; 4.1.1 Possible attacks to a mobile agent system 327 $a4.1.1.1 Possible attacks to a mobile agent 4.1.1.2 Possible attacks to a mobile agent platform ; 4.1.2 Security requirements for a secure mobile agent system ; 4.2 Related Works ; 4.2.1 Existing mobile agent systems ; 4.2.2 Security research 327 $a4.2.2.1 Security measures for a mobile agent platform 4.2.2.2 Security measures for a mobile agent ; 4.2.3 Mobility modeling ; 4.2.4 Conclusions ; 5 A New Formal Model - Extended Elementary Object System (EEOS) ; 5.1 Object-Oriented Technology and Petri Nets 327 $a5.2 Elementary Object System (EOS) 330 $a A mobile agent system could be attacked by malicious agents, platforms and third parties. Mobile agents simply offer greater opportunities for abuse and misuse, which broadens the scale of threats significantly. In addition, since mobile agents have some unique characteristics such as their mobility, security problems have become more complicated in these systems. These security problems have become a bottleneck in the development and maintenance of mobile agent systems, especially in security sensitive applications such as electronic commerce. This book introduces the concept and structure o 410 0$aSeries in electrical and computer engineering ;$vv. 5. 606 $aMobile agents (Computer software) 606 $aIntelligent agents (Computer software) 615 0$aMobile agents (Computer software) 615 0$aIntelligent agents (Computer software) 676 $a006.3 700 $aMa$b Lu$01557875 701 $aTsai$b Jeffrey J.-P$01484382 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910777016303321 996 $aSecurity modeling and analysis of mobile agent systems$93821841 997 $aUNINA