Security modeling and analysis of mobile agent systems:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
London
Imperial College Press
c2006
|
Schriftenreihe: | Series in electrical and computer engineering
v. 5 |
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | Includes bibliographical references and index Cover -- Contents -- Preface -- 1 Introduction -- 1.1 Background -- 2 Mobile Agent System -- 2.1 Components of a Mobile Agent System -- 2.2 Characteristics and Advantages of a Mobile Agent System -- 3 Attacks and Countermeasures of Software System Security -- 3.1 General Security Objectives -- 3.2 Types of Attacks -- 3.2.1 Attacks against availability -- 3.2.2 Attacks against confidentiality -- 3.2.3 Attacks against integrity -- 3.2.4 Attacks against miscellaneous security objectives -- 3.3 Countermeasures of Attacks -- 3.3.1 Authentication -- 3.3.2 Access control -- 3.3.3 Audit and intrusion detection -- 3.3.4 Cryptography -- 3.3.5 Firewall -- 3.3.6 Anti-virus software -- 4 Security Issues in a Mobile Agent System -- 4.1 Security Issues in a Mobile Agent System -- 4.1.1 Possible attacks to a mobile agent system -- 4.1.2 Security requirements for a secure mobile agent system & A mobile agent system could be attacked by malicious agents, platforms and third parties. Mobile agents simply offer greater opportunities for abuse and misuse, which broadens the scale of threats significantly. In addition, since mobile agents have some unique characteristics such as their mobility, security problems have become more complicated in these systems. These security problems have become a bottleneck in the development and maintenance of mobile agent systems, especially in security sensitive applications such as electronic commerce. This book introduces the concept and structure of mobile agent systems and discusses various attacks and countermeasures. The emphasis is on the formal modeling and analysis of secure mobile agent systems and their applications |
Beschreibung: | 1 Online-Ressource (xii, 200 p.) |
ISBN: | 1860949053 9781860949050 9781860946349 1860946348 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV042962944 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151030s2006 |||| o||u| ||||||eng d | ||
020 | |a 1860949053 |c electronic bk. |9 1-86094-905-3 | ||
020 | |a 9781860949050 |c electronic bk. |9 978-1-86094-905-0 | ||
020 | |a 9781860946349 |9 978-1-86094-634-9 | ||
020 | |a 9781860949050 |9 978-1-86094-905-0 | ||
020 | |a 1860946348 |9 1-86094-634-8 | ||
035 | |a (OCoLC)560444805 | ||
035 | |a (DE-599)BVBBV042962944 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 006.3 |2 22 | |
100 | 1 | |a Ma, Lu |e Verfasser |4 aut | |
245 | 1 | 0 | |a Security modeling and analysis of mobile agent systems |c Lu Ma, Jeffrey J.P. Tsai |
264 | 1 | |a London |b Imperial College Press |c c2006 | |
300 | |a 1 Online-Ressource (xii, 200 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Series in electrical and computer engineering |v v. 5 | |
500 | |a Includes bibliographical references and index | ||
500 | |a Cover -- Contents -- Preface -- 1 Introduction -- 1.1 Background -- 2 Mobile Agent System -- 2.1 Components of a Mobile Agent System -- 2.2 Characteristics and Advantages of a Mobile Agent System -- 3 Attacks and Countermeasures of Software System Security -- 3.1 General Security Objectives -- 3.2 Types of Attacks -- 3.2.1 Attacks against availability -- 3.2.2 Attacks against confidentiality -- 3.2.3 Attacks against integrity -- 3.2.4 Attacks against miscellaneous security objectives -- 3.3 Countermeasures of Attacks -- 3.3.1 Authentication -- 3.3.2 Access control -- 3.3.3 Audit and intrusion detection -- 3.3.4 Cryptography -- 3.3.5 Firewall -- 3.3.6 Anti-virus software -- 4 Security Issues in a Mobile Agent System -- 4.1 Security Issues in a Mobile Agent System -- 4.1.1 Possible attacks to a mobile agent system -- 4.1.2 Security requirements for a secure mobile agent system & | ||
500 | |a A mobile agent system could be attacked by malicious agents, platforms and third parties. Mobile agents simply offer greater opportunities for abuse and misuse, which broadens the scale of threats significantly. In addition, since mobile agents have some unique characteristics such as their mobility, security problems have become more complicated in these systems. These security problems have become a bottleneck in the development and maintenance of mobile agent systems, especially in security sensitive applications such as electronic commerce. This book introduces the concept and structure of mobile agent systems and discusses various attacks and countermeasures. The emphasis is on the formal modeling and analysis of secure mobile agent systems and their applications | ||
650 | 7 | |a COMPUTERS / Enterprise Applications / Business Intelligence Tools |2 bisacsh | |
650 | 7 | |a COMPUTERS / Intelligence (AI) & Semantics |2 bisacsh | |
650 | 7 | |a Intelligent agents (Computer software) |2 fast | |
650 | 7 | |a Mobile agents (Computer software) |2 fast | |
650 | 4 | |a Mobile agents (Computer software) | |
650 | 4 | |a Intelligent agents (Computer software) | |
700 | 1 | |a Tsai, Jeffrey J.-P. |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=210607 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA |a ZDB-4-EBU | ||
940 | 1 | |q FAW_PDA_EBA | |
940 | 1 | |q FLA_PDA_EBU | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028388811 |
Datensatz im Suchindex
_version_ | 1804175286015623168 |
---|---|
any_adam_object | |
author | Ma, Lu |
author_facet | Ma, Lu |
author_role | aut |
author_sort | Ma, Lu |
author_variant | l m lm |
building | Verbundindex |
bvnumber | BV042962944 |
collection | ZDB-4-EBA ZDB-4-EBU |
ctrlnum | (OCoLC)560444805 (DE-599)BVBBV042962944 |
dewey-full | 006.3 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods |
dewey-raw | 006.3 |
dewey-search | 006.3 |
dewey-sort | 16.3 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03492nmm a2200493zcb4500</leader><controlfield tag="001">BV042962944</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151030s2006 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1860949053</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-86094-905-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781860949050</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-86094-905-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781860946349</subfield><subfield code="9">978-1-86094-634-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781860949050</subfield><subfield code="9">978-1-86094-905-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1860946348</subfield><subfield code="9">1-86094-634-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)560444805</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042962944</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">006.3</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ma, Lu</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security modeling and analysis of mobile agent systems</subfield><subfield code="c">Lu Ma, Jeffrey J.P. Tsai</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London</subfield><subfield code="b">Imperial College Press</subfield><subfield code="c">c2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xii, 200 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Series in electrical and computer engineering</subfield><subfield code="v">v. 5</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Cover -- Contents -- Preface -- 1 Introduction -- 1.1 Background -- 2 Mobile Agent System -- 2.1 Components of a Mobile Agent System -- 2.2 Characteristics and Advantages of a Mobile Agent System -- 3 Attacks and Countermeasures of Software System Security -- 3.1 General Security Objectives -- 3.2 Types of Attacks -- 3.2.1 Attacks against availability -- 3.2.2 Attacks against confidentiality -- 3.2.3 Attacks against integrity -- 3.2.4 Attacks against miscellaneous security objectives -- 3.3 Countermeasures of Attacks -- 3.3.1 Authentication -- 3.3.2 Access control -- 3.3.3 Audit and intrusion detection -- 3.3.4 Cryptography -- 3.3.5 Firewall -- 3.3.6 Anti-virus software -- 4 Security Issues in a Mobile Agent System -- 4.1 Security Issues in a Mobile Agent System -- 4.1.1 Possible attacks to a mobile agent system -- 4.1.2 Security requirements for a secure mobile agent system &</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">A mobile agent system could be attacked by malicious agents, platforms and third parties. Mobile agents simply offer greater opportunities for abuse and misuse, which broadens the scale of threats significantly. In addition, since mobile agents have some unique characteristics such as their mobility, security problems have become more complicated in these systems. These security problems have become a bottleneck in the development and maintenance of mobile agent systems, especially in security sensitive applications such as electronic commerce. This book introduces the concept and structure of mobile agent systems and discusses various attacks and countermeasures. The emphasis is on the formal modeling and analysis of secure mobile agent systems and their applications</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Enterprise Applications / Business Intelligence Tools</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Intelligence (AI) & Semantics</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Intelligent agents (Computer software)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Mobile agents (Computer software)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile agents (Computer software)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Intelligent agents (Computer software)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tsai, Jeffrey J.-P.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=210607</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield><subfield code="a">ZDB-4-EBU</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_EBA</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_EBU</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028388811</subfield></datafield></record></collection> |
id | DE-604.BV042962944 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:13:52Z |
institution | BVB |
isbn | 1860949053 9781860949050 9781860946349 1860946348 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028388811 |
oclc_num | 560444805 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xii, 200 p.) |
psigel | ZDB-4-EBA ZDB-4-EBU FAW_PDA_EBA FLA_PDA_EBU |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Imperial College Press |
record_format | marc |
series2 | Series in electrical and computer engineering |
spelling | Ma, Lu Verfasser aut Security modeling and analysis of mobile agent systems Lu Ma, Jeffrey J.P. Tsai London Imperial College Press c2006 1 Online-Ressource (xii, 200 p.) txt rdacontent c rdamedia cr rdacarrier Series in electrical and computer engineering v. 5 Includes bibliographical references and index Cover -- Contents -- Preface -- 1 Introduction -- 1.1 Background -- 2 Mobile Agent System -- 2.1 Components of a Mobile Agent System -- 2.2 Characteristics and Advantages of a Mobile Agent System -- 3 Attacks and Countermeasures of Software System Security -- 3.1 General Security Objectives -- 3.2 Types of Attacks -- 3.2.1 Attacks against availability -- 3.2.2 Attacks against confidentiality -- 3.2.3 Attacks against integrity -- 3.2.4 Attacks against miscellaneous security objectives -- 3.3 Countermeasures of Attacks -- 3.3.1 Authentication -- 3.3.2 Access control -- 3.3.3 Audit and intrusion detection -- 3.3.4 Cryptography -- 3.3.5 Firewall -- 3.3.6 Anti-virus software -- 4 Security Issues in a Mobile Agent System -- 4.1 Security Issues in a Mobile Agent System -- 4.1.1 Possible attacks to a mobile agent system -- 4.1.2 Security requirements for a secure mobile agent system & A mobile agent system could be attacked by malicious agents, platforms and third parties. Mobile agents simply offer greater opportunities for abuse and misuse, which broadens the scale of threats significantly. In addition, since mobile agents have some unique characteristics such as their mobility, security problems have become more complicated in these systems. These security problems have become a bottleneck in the development and maintenance of mobile agent systems, especially in security sensitive applications such as electronic commerce. This book introduces the concept and structure of mobile agent systems and discusses various attacks and countermeasures. The emphasis is on the formal modeling and analysis of secure mobile agent systems and their applications COMPUTERS / Enterprise Applications / Business Intelligence Tools bisacsh COMPUTERS / Intelligence (AI) & Semantics bisacsh Intelligent agents (Computer software) fast Mobile agents (Computer software) fast Mobile agents (Computer software) Intelligent agents (Computer software) Tsai, Jeffrey J.-P. Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=210607 Aggregator Volltext |
spellingShingle | Ma, Lu Security modeling and analysis of mobile agent systems COMPUTERS / Enterprise Applications / Business Intelligence Tools bisacsh COMPUTERS / Intelligence (AI) & Semantics bisacsh Intelligent agents (Computer software) fast Mobile agents (Computer software) fast Mobile agents (Computer software) Intelligent agents (Computer software) |
title | Security modeling and analysis of mobile agent systems |
title_auth | Security modeling and analysis of mobile agent systems |
title_exact_search | Security modeling and analysis of mobile agent systems |
title_full | Security modeling and analysis of mobile agent systems Lu Ma, Jeffrey J.P. Tsai |
title_fullStr | Security modeling and analysis of mobile agent systems Lu Ma, Jeffrey J.P. Tsai |
title_full_unstemmed | Security modeling and analysis of mobile agent systems Lu Ma, Jeffrey J.P. Tsai |
title_short | Security modeling and analysis of mobile agent systems |
title_sort | security modeling and analysis of mobile agent systems |
topic | COMPUTERS / Enterprise Applications / Business Intelligence Tools bisacsh COMPUTERS / Intelligence (AI) & Semantics bisacsh Intelligent agents (Computer software) fast Mobile agents (Computer software) fast Mobile agents (Computer software) Intelligent agents (Computer software) |
topic_facet | COMPUTERS / Enterprise Applications / Business Intelligence Tools COMPUTERS / Intelligence (AI) & Semantics Intelligent agents (Computer software) Mobile agents (Computer software) |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=210607 |
work_keys_str_mv | AT malu securitymodelingandanalysisofmobileagentsystems AT tsaijeffreyjp securitymodelingandanalysisofmobileagentsystems |