Security modeling and analysis of mobile agent systems /:
A mobile agent system could be attacked by malicious agents, platforms and third parties. Mobile agents simply offer greater opportunities for abuse and misuse, which broadens the scale of threats significantly. In addition, since mobile agents have some unique characteristics such as their mobility...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
London ; Hackensack, NJ :
Imperial College Press,
©2006.
|
Schriftenreihe: | Series in electrical and computer engineering ;
v. 5. |
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | A mobile agent system could be attacked by malicious agents, platforms and third parties. Mobile agents simply offer greater opportunities for abuse and misuse, which broadens the scale of threats significantly. In addition, since mobile agents have some unique characteristics such as their mobility, security problems have become more complicated in these systems. These security problems have become a bottleneck in the development and maintenance of mobile agent systems, especially in security sensitive applications such as electronic commerce. This book introduces the concept and structure of mobile agent systems and discusses various attacks and countermeasures. The emphasis is on the formal modeling and analysis of secure mobile agent systems and their applications. |
Beschreibung: | 1 online resource (xii, 200 pages) : illustrations. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 1860949053 9781860949050 1281347558 9781281347558 9786611347550 6611347550 |
Internformat
MARC
LEADER | 00000cam a2200000Ma 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn560444805 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 061018s2006 enka ob 001 0 eng d | ||
010 | |z 2006284178 | ||
040 | |a MERUC |b eng |e pn |c MERUC |d CCO |d E7B |d OCLCQ |d COCUF |d N$T |d YDXCP |d OCLCQ |d UV0 |d IDEBK |d FVL |d OCLCQ |d OCLCF |d OCLCQ |d OCLCO |d OCLCQ |d AZK |d AGLDB |d OCLCQ |d MOR |d PIFAG |d OCLCQ |d U3W |d STF |d WRM |d OCLCQ |d VTS |d NRAMU |d INT |d VT2 |d OCLCQ |d WYU |d OCLCQ |d M8D |d UKAHL |d LEAUB |d UKCRE |d VLY |d OCLCA |d OCLCO |d OCLCQ |d INARC |d OCLCO |d SXB |d OCLCQ |d OCLCO | ||
015 | |a GBA660259 |2 bnb | ||
016 | 7 | |a 013501786 |2 Uk | |
019 | |a 181201967 |a 305126123 |a 335627393 |a 647682781 |a 722614482 |a 728032601 |a 748525321 |a 961585815 |a 962558625 |a 988523393 |a 992106671 |a 1037691536 |a 1038619483 |a 1045440727 |a 1055344935 |a 1064034245 |a 1081290732 |a 1086444826 |a 1153528514 |a 1162445558 |a 1228566103 |a 1290104067 |a 1300679923 |a 1392118789 | ||
020 | |a 1860949053 |q (electronic bk.) | ||
020 | |a 9781860949050 |q (electronic bk.) | ||
020 | |z 9781860946349 | ||
020 | |z 9781860949050 | ||
020 | |z 1860946348 | ||
020 | |a 1281347558 | ||
020 | |a 9781281347558 | ||
020 | |a 9786611347550 | ||
020 | |a 6611347550 | ||
035 | |a (OCoLC)560444805 |z (OCoLC)181201967 |z (OCoLC)305126123 |z (OCoLC)335627393 |z (OCoLC)647682781 |z (OCoLC)722614482 |z (OCoLC)728032601 |z (OCoLC)748525321 |z (OCoLC)961585815 |z (OCoLC)962558625 |z (OCoLC)988523393 |z (OCoLC)992106671 |z (OCoLC)1037691536 |z (OCoLC)1038619483 |z (OCoLC)1045440727 |z (OCoLC)1055344935 |z (OCoLC)1064034245 |z (OCoLC)1081290732 |z (OCoLC)1086444826 |z (OCoLC)1153528514 |z (OCoLC)1162445558 |z (OCoLC)1228566103 |z (OCoLC)1290104067 |z (OCoLC)1300679923 |z (OCoLC)1392118789 | ||
050 | 4 | |a QA76.76.I58 |b M315 2006eb | |
072 | 7 | |a COM |x 005030 |2 bisacsh | |
072 | 7 | |a COM |x 004000 |2 bisacsh | |
072 | 7 | |a UYQ |2 bicssc | |
082 | 7 | |a 006.3 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Ma, Lu. |1 https://id.oclc.org/worldcat/entity/E39PCjKGdhHP9RgGTBryVxrXMK |0 http://id.loc.gov/authorities/names/nr98004006 | |
245 | 1 | 0 | |a Security modeling and analysis of mobile agent systems / |c Lu Ma, Jeffrey J.P. Tsai. |
260 | |a London ; |a Hackensack, NJ : |b Imperial College Press, |c ©2006. | ||
300 | |a 1 online resource (xii, 200 pages) : |b illustrations. | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Series in electrical and computer engineering ; |v v. 5 | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Cover -- Contents -- Preface -- 1 Introduction -- 1.1 Background -- 2 Mobile Agent System -- 2.1 Components of a Mobile Agent System -- 2.2 Characteristics and Advantages of a Mobile Agent System -- 3 Attacks and Countermeasures of Software System Security -- 3.1 General Security Objectives -- 3.2 Types of Attacks -- 3.2.1 Attacks against availability -- 3.2.2 Attacks against confidentiality -- 3.2.3 Attacks against integrity -- 3.2.4 Attacks against miscellaneous security objectives -- 3.3 Countermeasures of Attacks -- 3.3.1 Authentication -- 3.3.2 Access control -- 3.3.3 Audit and intrusion detection -- 3.3.4 Cryptography -- 3.3.5 Firewall -- 3.3.6 Anti-virus software -- 4 Security Issues in a Mobile Agent System -- 4.1 Security Issues in a Mobile Agent System -- 4.1.1 Possible attacks to a mobile agent system -- 4.1.2 Security requirements for a secure mobile agent system & | |
520 | |a A mobile agent system could be attacked by malicious agents, platforms and third parties. Mobile agents simply offer greater opportunities for abuse and misuse, which broadens the scale of threats significantly. In addition, since mobile agents have some unique characteristics such as their mobility, security problems have become more complicated in these systems. These security problems have become a bottleneck in the development and maintenance of mobile agent systems, especially in security sensitive applications such as electronic commerce. This book introduces the concept and structure of mobile agent systems and discusses various attacks and countermeasures. The emphasis is on the formal modeling and analysis of secure mobile agent systems and their applications. | ||
588 | 0 | |a Print version record. | |
546 | |a English. | ||
650 | 0 | |a Mobile agents (Computer software) |0 http://id.loc.gov/authorities/subjects/sh98002845 | |
650 | 0 | |a Intelligent agents (Computer software) |0 http://id.loc.gov/authorities/subjects/sh97000493 | |
650 | 6 | |a Agents mobiles (Logiciels) | |
650 | 6 | |a Agents intelligents (Logiciels) | |
650 | 7 | |a COMPUTERS |x Enterprise Applications |x Business Intelligence Tools. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Intelligence (AI) & Semantics. |2 bisacsh | |
650 | 7 | |a Intelligent agents (Computer software) |2 fast | |
650 | 7 | |a Mobile agents (Computer software) |2 fast | |
700 | 1 | |a Tsai, Jeffrey J.-P. | |
776 | 0 | 8 | |i Print version: |a Ma, Lu. |t Security modeling and analysis of mobile agent systems. |d London ; Hackensack, NJ : Imperial College Press, ©2006 |w (DLC) 2006284178 |
830 | 0 | |a Series in electrical and computer engineering ; |v v. 5. |0 http://id.loc.gov/authorities/names/no2003123710 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=210607 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH24683069 | ||
938 | |a ebrary |b EBRY |n ebr10201142 | ||
938 | |a EBSCOhost |b EBSC |n 210607 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n 134755 | ||
938 | |a YBP Library Services |b YANK |n 2733635 | ||
938 | |a Internet Archive |b INAR |n securitymodeling0000malu | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn560444805 |
---|---|
_version_ | 1816881707701239808 |
adam_text | |
any_adam_object | |
author | Ma, Lu |
author2 | Tsai, Jeffrey J.-P |
author2_role | |
author2_variant | j j p t jjp jjpt |
author_GND | http://id.loc.gov/authorities/names/nr98004006 |
author_facet | Ma, Lu Tsai, Jeffrey J.-P |
author_role | |
author_sort | Ma, Lu |
author_variant | l m lm |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.76.I58 M315 2006eb |
callnumber-search | QA76.76.I58 M315 2006eb |
callnumber-sort | QA 276.76 I58 M315 42006EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Cover -- Contents -- Preface -- 1 Introduction -- 1.1 Background -- 2 Mobile Agent System -- 2.1 Components of a Mobile Agent System -- 2.2 Characteristics and Advantages of a Mobile Agent System -- 3 Attacks and Countermeasures of Software System Security -- 3.1 General Security Objectives -- 3.2 Types of Attacks -- 3.2.1 Attacks against availability -- 3.2.2 Attacks against confidentiality -- 3.2.3 Attacks against integrity -- 3.2.4 Attacks against miscellaneous security objectives -- 3.3 Countermeasures of Attacks -- 3.3.1 Authentication -- 3.3.2 Access control -- 3.3.3 Audit and intrusion detection -- 3.3.4 Cryptography -- 3.3.5 Firewall -- 3.3.6 Anti-virus software -- 4 Security Issues in a Mobile Agent System -- 4.1 Security Issues in a Mobile Agent System -- 4.1.1 Possible attacks to a mobile agent system -- 4.1.2 Security requirements for a secure mobile agent system & |
ctrlnum | (OCoLC)560444805 |
dewey-full | 006.3 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods |
dewey-raw | 006.3 |
dewey-search | 006.3 |
dewey-sort | 16.3 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05645cam a2200733Ma 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn560444805</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">061018s2006 enka ob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2006284178</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MERUC</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">MERUC</subfield><subfield code="d">CCO</subfield><subfield code="d">E7B</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COCUF</subfield><subfield code="d">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UV0</subfield><subfield code="d">IDEBK</subfield><subfield code="d">FVL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AZK</subfield><subfield code="d">AGLDB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MOR</subfield><subfield code="d">PIFAG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">U3W</subfield><subfield code="d">STF</subfield><subfield code="d">WRM</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">NRAMU</subfield><subfield code="d">INT</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">M8D</subfield><subfield code="d">UKAHL</subfield><subfield code="d">LEAUB</subfield><subfield code="d">UKCRE</subfield><subfield code="d">VLY</subfield><subfield code="d">OCLCA</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">INARC</subfield><subfield code="d">OCLCO</subfield><subfield code="d">SXB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBA660259</subfield><subfield code="2">bnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">013501786</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">181201967</subfield><subfield code="a">305126123</subfield><subfield code="a">335627393</subfield><subfield code="a">647682781</subfield><subfield code="a">722614482</subfield><subfield code="a">728032601</subfield><subfield code="a">748525321</subfield><subfield code="a">961585815</subfield><subfield code="a">962558625</subfield><subfield code="a">988523393</subfield><subfield code="a">992106671</subfield><subfield code="a">1037691536</subfield><subfield code="a">1038619483</subfield><subfield code="a">1045440727</subfield><subfield code="a">1055344935</subfield><subfield code="a">1064034245</subfield><subfield code="a">1081290732</subfield><subfield code="a">1086444826</subfield><subfield code="a">1153528514</subfield><subfield code="a">1162445558</subfield><subfield code="a">1228566103</subfield><subfield code="a">1290104067</subfield><subfield code="a">1300679923</subfield><subfield code="a">1392118789</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1860949053</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781860949050</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781860946349</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781860949050</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1860946348</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281347558</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281347558</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786611347550</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6611347550</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)560444805</subfield><subfield code="z">(OCoLC)181201967</subfield><subfield code="z">(OCoLC)305126123</subfield><subfield code="z">(OCoLC)335627393</subfield><subfield code="z">(OCoLC)647682781</subfield><subfield code="z">(OCoLC)722614482</subfield><subfield code="z">(OCoLC)728032601</subfield><subfield code="z">(OCoLC)748525321</subfield><subfield code="z">(OCoLC)961585815</subfield><subfield code="z">(OCoLC)962558625</subfield><subfield code="z">(OCoLC)988523393</subfield><subfield code="z">(OCoLC)992106671</subfield><subfield code="z">(OCoLC)1037691536</subfield><subfield code="z">(OCoLC)1038619483</subfield><subfield code="z">(OCoLC)1045440727</subfield><subfield code="z">(OCoLC)1055344935</subfield><subfield code="z">(OCoLC)1064034245</subfield><subfield code="z">(OCoLC)1081290732</subfield><subfield code="z">(OCoLC)1086444826</subfield><subfield code="z">(OCoLC)1153528514</subfield><subfield code="z">(OCoLC)1162445558</subfield><subfield code="z">(OCoLC)1228566103</subfield><subfield code="z">(OCoLC)1290104067</subfield><subfield code="z">(OCoLC)1300679923</subfield><subfield code="z">(OCoLC)1392118789</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.76.I58</subfield><subfield code="b">M315 2006eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">005030</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">004000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UYQ</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">006.3</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ma, Lu.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjKGdhHP9RgGTBryVxrXMK</subfield><subfield code="0">http://id.loc.gov/authorities/names/nr98004006</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security modeling and analysis of mobile agent systems /</subfield><subfield code="c">Lu Ma, Jeffrey J.P. Tsai.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">London ;</subfield><subfield code="a">Hackensack, NJ :</subfield><subfield code="b">Imperial College Press,</subfield><subfield code="c">©2006.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xii, 200 pages) :</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Series in electrical and computer engineering ;</subfield><subfield code="v">v. 5</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover -- Contents -- Preface -- 1 Introduction -- 1.1 Background -- 2 Mobile Agent System -- 2.1 Components of a Mobile Agent System -- 2.2 Characteristics and Advantages of a Mobile Agent System -- 3 Attacks and Countermeasures of Software System Security -- 3.1 General Security Objectives -- 3.2 Types of Attacks -- 3.2.1 Attacks against availability -- 3.2.2 Attacks against confidentiality -- 3.2.3 Attacks against integrity -- 3.2.4 Attacks against miscellaneous security objectives -- 3.3 Countermeasures of Attacks -- 3.3.1 Authentication -- 3.3.2 Access control -- 3.3.3 Audit and intrusion detection -- 3.3.4 Cryptography -- 3.3.5 Firewall -- 3.3.6 Anti-virus software -- 4 Security Issues in a Mobile Agent System -- 4.1 Security Issues in a Mobile Agent System -- 4.1.1 Possible attacks to a mobile agent system -- 4.1.2 Security requirements for a secure mobile agent system &</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">A mobile agent system could be attacked by malicious agents, platforms and third parties. Mobile agents simply offer greater opportunities for abuse and misuse, which broadens the scale of threats significantly. In addition, since mobile agents have some unique characteristics such as their mobility, security problems have become more complicated in these systems. These security problems have become a bottleneck in the development and maintenance of mobile agent systems, especially in security sensitive applications such as electronic commerce. This book introduces the concept and structure of mobile agent systems and discusses various attacks and countermeasures. The emphasis is on the formal modeling and analysis of secure mobile agent systems and their applications.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Mobile agents (Computer software)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh98002845</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Intelligent agents (Computer software)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh97000493</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Agents mobiles (Logiciels)</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Agents intelligents (Logiciels)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Enterprise Applications</subfield><subfield code="x">Business Intelligence Tools.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Intelligence (AI) & Semantics.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Intelligent agents (Computer software)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Mobile agents (Computer software)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tsai, Jeffrey J.-P.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Ma, Lu.</subfield><subfield code="t">Security modeling and analysis of mobile agent systems.</subfield><subfield code="d">London ; Hackensack, NJ : Imperial College Press, ©2006</subfield><subfield code="w">(DLC) 2006284178</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Series in electrical and computer engineering ;</subfield><subfield code="v">v. 5.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2003123710</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=210607</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH24683069</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10201142</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">210607</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">134755</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2733635</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">securitymodeling0000malu</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn560444805 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:17:00Z |
institution | BVB |
isbn | 1860949053 9781860949050 1281347558 9781281347558 9786611347550 6611347550 |
language | English |
oclc_num | 560444805 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xii, 200 pages) : illustrations. |
psigel | ZDB-4-EBA |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Imperial College Press, |
record_format | marc |
series | Series in electrical and computer engineering ; |
series2 | Series in electrical and computer engineering ; |
spelling | Ma, Lu. https://id.oclc.org/worldcat/entity/E39PCjKGdhHP9RgGTBryVxrXMK http://id.loc.gov/authorities/names/nr98004006 Security modeling and analysis of mobile agent systems / Lu Ma, Jeffrey J.P. Tsai. London ; Hackensack, NJ : Imperial College Press, ©2006. 1 online resource (xii, 200 pages) : illustrations. text txt rdacontent computer c rdamedia online resource cr rdacarrier Series in electrical and computer engineering ; v. 5 Includes bibliographical references and index. Cover -- Contents -- Preface -- 1 Introduction -- 1.1 Background -- 2 Mobile Agent System -- 2.1 Components of a Mobile Agent System -- 2.2 Characteristics and Advantages of a Mobile Agent System -- 3 Attacks and Countermeasures of Software System Security -- 3.1 General Security Objectives -- 3.2 Types of Attacks -- 3.2.1 Attacks against availability -- 3.2.2 Attacks against confidentiality -- 3.2.3 Attacks against integrity -- 3.2.4 Attacks against miscellaneous security objectives -- 3.3 Countermeasures of Attacks -- 3.3.1 Authentication -- 3.3.2 Access control -- 3.3.3 Audit and intrusion detection -- 3.3.4 Cryptography -- 3.3.5 Firewall -- 3.3.6 Anti-virus software -- 4 Security Issues in a Mobile Agent System -- 4.1 Security Issues in a Mobile Agent System -- 4.1.1 Possible attacks to a mobile agent system -- 4.1.2 Security requirements for a secure mobile agent system & A mobile agent system could be attacked by malicious agents, platforms and third parties. Mobile agents simply offer greater opportunities for abuse and misuse, which broadens the scale of threats significantly. In addition, since mobile agents have some unique characteristics such as their mobility, security problems have become more complicated in these systems. These security problems have become a bottleneck in the development and maintenance of mobile agent systems, especially in security sensitive applications such as electronic commerce. This book introduces the concept and structure of mobile agent systems and discusses various attacks and countermeasures. The emphasis is on the formal modeling and analysis of secure mobile agent systems and their applications. Print version record. English. Mobile agents (Computer software) http://id.loc.gov/authorities/subjects/sh98002845 Intelligent agents (Computer software) http://id.loc.gov/authorities/subjects/sh97000493 Agents mobiles (Logiciels) Agents intelligents (Logiciels) COMPUTERS Enterprise Applications Business Intelligence Tools. bisacsh COMPUTERS Intelligence (AI) & Semantics. bisacsh Intelligent agents (Computer software) fast Mobile agents (Computer software) fast Tsai, Jeffrey J.-P. Print version: Ma, Lu. Security modeling and analysis of mobile agent systems. London ; Hackensack, NJ : Imperial College Press, ©2006 (DLC) 2006284178 Series in electrical and computer engineering ; v. 5. http://id.loc.gov/authorities/names/no2003123710 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=210607 Volltext |
spellingShingle | Ma, Lu Security modeling and analysis of mobile agent systems / Series in electrical and computer engineering ; Cover -- Contents -- Preface -- 1 Introduction -- 1.1 Background -- 2 Mobile Agent System -- 2.1 Components of a Mobile Agent System -- 2.2 Characteristics and Advantages of a Mobile Agent System -- 3 Attacks and Countermeasures of Software System Security -- 3.1 General Security Objectives -- 3.2 Types of Attacks -- 3.2.1 Attacks against availability -- 3.2.2 Attacks against confidentiality -- 3.2.3 Attacks against integrity -- 3.2.4 Attacks against miscellaneous security objectives -- 3.3 Countermeasures of Attacks -- 3.3.1 Authentication -- 3.3.2 Access control -- 3.3.3 Audit and intrusion detection -- 3.3.4 Cryptography -- 3.3.5 Firewall -- 3.3.6 Anti-virus software -- 4 Security Issues in a Mobile Agent System -- 4.1 Security Issues in a Mobile Agent System -- 4.1.1 Possible attacks to a mobile agent system -- 4.1.2 Security requirements for a secure mobile agent system & Mobile agents (Computer software) http://id.loc.gov/authorities/subjects/sh98002845 Intelligent agents (Computer software) http://id.loc.gov/authorities/subjects/sh97000493 Agents mobiles (Logiciels) Agents intelligents (Logiciels) COMPUTERS Enterprise Applications Business Intelligence Tools. bisacsh COMPUTERS Intelligence (AI) & Semantics. bisacsh Intelligent agents (Computer software) fast Mobile agents (Computer software) fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh98002845 http://id.loc.gov/authorities/subjects/sh97000493 |
title | Security modeling and analysis of mobile agent systems / |
title_auth | Security modeling and analysis of mobile agent systems / |
title_exact_search | Security modeling and analysis of mobile agent systems / |
title_full | Security modeling and analysis of mobile agent systems / Lu Ma, Jeffrey J.P. Tsai. |
title_fullStr | Security modeling and analysis of mobile agent systems / Lu Ma, Jeffrey J.P. Tsai. |
title_full_unstemmed | Security modeling and analysis of mobile agent systems / Lu Ma, Jeffrey J.P. Tsai. |
title_short | Security modeling and analysis of mobile agent systems / |
title_sort | security modeling and analysis of mobile agent systems |
topic | Mobile agents (Computer software) http://id.loc.gov/authorities/subjects/sh98002845 Intelligent agents (Computer software) http://id.loc.gov/authorities/subjects/sh97000493 Agents mobiles (Logiciels) Agents intelligents (Logiciels) COMPUTERS Enterprise Applications Business Intelligence Tools. bisacsh COMPUTERS Intelligence (AI) & Semantics. bisacsh Intelligent agents (Computer software) fast Mobile agents (Computer software) fast |
topic_facet | Mobile agents (Computer software) Intelligent agents (Computer software) Agents mobiles (Logiciels) Agents intelligents (Logiciels) COMPUTERS Enterprise Applications Business Intelligence Tools. COMPUTERS Intelligence (AI) & Semantics. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=210607 |
work_keys_str_mv | AT malu securitymodelingandanalysisofmobileagentsystems AT tsaijeffreyjp securitymodelingandanalysisofmobileagentsystems |