Sciweavers

67 search results - page 8 / 14
» An Approach for Mobile Agent Security and Fault Tolerance us...
Sort
View
CCS
2007
ACM
14 years 1 months ago
Robust group key agreement using short broadcasts
A group key agreement protocol (GKA) allows a set of players to establish a shared secret key which can be used to secure a subsequent communication. Several efficient constantrou...
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
IJNSEC
2008
129views more  IJNSEC 2008»
13 years 7 months ago
LAMAIDS: A Lightweight Adaptive Mobile Agent-based Intrusion Detection System
Intrusion detection system (IDS) has become an essential component of a computer security scheme as the number of security-breaking attempts originating inside organizations is in...
Mohamad A. Eid, Hassan Artail, Ayman I. Kayssi, Al...
IEEEIA
2009
13 years 5 months ago
Information Leakage Detection in Distributed Systems using Software Agent
Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unauthorized parties. Current security mechanisms such as SELinux rely on tagging th...
Yung-Chuan Lee, Stephen Bishop, Hamed Okhravi, Sha...
IJNSEC
2006
89views more  IJNSEC 2006»
13 years 7 months ago
Mitigation of Insider Risks using Distributed Agent Detection, Filtering, and Signaling
An insider-robust approach to file integrity verification is developed using interacting strata of mobile agents. Previous approaches relied upon monolithic architectures, or more...
Adam J. Rocke, Ronald F. DeMara
MA
1997
Springer
149views Communications» more  MA 1997»
13 years 11 months ago
Java-Based Mobile Agents - How to Migrate, Persist, and Interact on Electronic Service Markets
This paper presents a mobile agent approach that aims at satisfying the following requirements of open Internet-based electronic service markets: the mobile agent system should be...
Boris Liberman, Frank Griffel, Michael Merz, Winfr...