Sciweavers

57 search results - page 6 / 12
» A secure method for signature delegation to mobile agents
Sort
View
SAC
2004
ACM
14 years 29 days ago
Using mobile agents as roaming security guards to test and improve security of hosts and networks
1 This paper discusses the design and implementation details of MAST (Mobile Agent-based Security Tool), a new mobile agentbased network security approach. MAST has been designed t...
Marco M. Carvalho, Thomas B. Cowin, Niranjan Suri,...
FTDCS
1997
IEEE
13 years 11 months ago
Distributed Transaction Processing as a Reliability Concept for Mobile Agents
Mobile agents offer a new possibility for the development of applications in distributed systems and are no longer a theoretical issue since different architectures for their impl...
Hartmut Vogler, Thomas Kunkelmann, Marie-Luise Mos...
OTM
2007
Springer
14 years 1 months ago
A Novel Overlay Network for a Secure Global Home Agent Dynamic Discovery
Mobile IP and Network Mobility are the IETF proposals to obtain mobility. However, both of them have routing limitations, due to the presence of an entity (Home Agent) in the commu...
Ángel Cuevas, Rubén Cuevas Rum&iacut...
ACSAC
2001
IEEE
13 years 11 months ago
Determining Privileges of Mobile Agents
This paper describes a method for controlling the behavior of mobile agent-system entities through the allocation of privileges. Privileges refer to policy rules that govern the a...
Wayne A. Jansen
ESAS
2007
Springer
14 years 1 months ago
Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences
The problem of secure routing in mobile ad hoc networks is long-standing and has been extensively studied by researchers. Recently, techniques of aggregating signatures have been a...
Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mu...