DocumentCode :
2399177
Title :
Security in mobile agent systems
Author :
Sameh, Ahmed ; Fakhry, Dalia
Author_Institution :
Dept. of Comput. Sci., American Univ. in Cairo, Egypt
fYear :
2002
fDate :
2002
Firstpage :
4
Lastpage :
5
Abstract :
There are four possible security attacks: Attacks from host to host, from agents to hosts, from agents to agents and finally from hosts to agents. Our main concern is attacks from a malicious host on an agent. These attacks can take many forms including rerouting, spying out code, spying out data, spying out control flow, manipulation of code, manipulation of data, manipulation of control flow, incorrect execution of code, masquerading and denial of execution. This paper presents a three-tier solution of code mess up, encryption and time out
Keywords :
Internet; cryptography; software agents; telecommunication security; Internet; code manipulation; code mess up; code spying; control flow manipulation; control flow spying; data manipulation; data spying; denial of execution; encryption; incorrect code execution; malicious host; masquerading; mobile agent systems; rerouting; security attacks; three-tier solution; time out; Code standards; Computer science; Computer security; Costs; Cryptography; Data security; Libraries; Mobile agents; Protection; Time factors;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Applications and the Internet, 2002. (SAINT 2002). Proceedings. 2002 Symposium on
Conference_Location :
Nara
Print_ISBN :
0-7695-1447-2
Type :
conf
DOI :
10.1109/SAINT.2002.994431
Filename :
994431
Link To Document :
بازگشت