A new mechanism for protecting mobile agents

被引:0
|
作者
Zhong, ZF [1 ]
Zhu, FX [1 ]
机构
[1] Wuhan Univ, Sch Comp, Wuhan 430072, Hubei, Peoples R China
来源
关键词
D O I
10.1142/9789812704313_0029
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Security is a major problem of mobile agents. In this paper, we firstly discuss both the security threats and the protection issues. After that we introduce a new mechanism for protecting mobile agents based on detail analysis of data categories of mobile agents. This active-prevention mechanism following software-protecting way is much more secure than many other mechanisms, as it can not only prevent the Tamper-attack, but also prevents the Read-attack.
引用
收藏
页码:231 / 237
页数:7
相关论文
共 50 条
  • [31] A Hierarchical Mobile Agent Monitoring Mechanism with XML-Based Mobile Agents
    Valliyammai, C.
    Selvi, S. Thamarai
    TRENDS IN NETWORKS AND COMMUNICATIONS, 2011, 197 : 78 - 87
  • [32] A hierarchical mobile agent monitoring mechanism with XML-based mobile agents
    Valliyammai, C.
    Thamarai Selvi, S.
    Communications in Computer and Information Science, 2011, 197 CCIS : 78 - 87
  • [33] A new protocol for protecting a mobile agent using a reference clone
    Benachenhou, L
    Pierre, S
    MOBILITY AWARE TECHNOLOGIES AND APPLICATIONS, PROCEEDINGS, 2005, 3744 : 364 - 373
  • [34] CryptoComputing approach to protecting interaction protocols of mobile agents from malicious host attack
    Bellemin, Velik
    Araragi, Tadashi
    DEPCOS-RELCOMEX 2006, 2006, : 240 - 247
  • [35] A scheme for protecting mobile agents based on combining obfuscated data and time checking technology
    Wu, Jiehong
    Chang, Guiran
    Li, Jia
    2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 1, PROCEEDINGS, 2007, : 221 - 224
  • [36] Dummy-Based Approach for Protecting Mobile Agents Against Malicious Destination Machines
    Alluhaybi, Bandar
    Alrahhal, Mohamad Shady
    Alzahrani, Ahmed
    Thayananthan, Vijey
    IEEE ACCESS, 2020, 8 : 129320 - 129337
  • [37] From protecting soldiers to protecting mobile phones
    Coulson, Stephen
    TRANSLATIONAL MATERIALS RESEARCH, 2014, 1 (01):
  • [38] Protecting mobile code
    Sander, T
    NINTH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING, PROCEEDINGS, 1998, : 183 - 183
  • [39] Research on cooperation mechanism of mobile agents in distributed database systems
    Liu, ZP
    Jiang, JB
    Li, KL
    Du, RZ
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XII, PROCEEDINGS: INFORMATION SYSTEMS, TECHNOLOGIES AND APPLICATIONS: II, 2003, : 407 - 411
  • [40] Cooperating intelligent mobile agents mechanism for distributed multimedia synchronization
    Wang, YH
    Lin, HZ
    2000 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, PROCEEDINGS VOLS I-III, 2000, : 743 - 746