An approach to mobile agent security in Java
Virden, Roy John
Volpano, Dennis M.
Ludlow, Nelson D.
MetadataShow full item record
For many years, people have talked about the advantages of programs that can roam networks and provide services for a client. The programs, called agents, have many military applications as well. Among them, for instance, is data mining, where an agent is dispatched to find information for a client. There are security risks associated with agents. For instance, in the data mining example, a client must be able to trust the information returned. If a trusted node in a network can be spoofed, then an untrusted node can easily corrupt the results of the mining operation. This thesis presents a protocol to guard against this sort of attack. The protocol assumes that every trusted host knows all other trusted hosts. Though unrealistic for some commercial applications, it seems like a reasonable assumption for military applications.
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Showing items related by title, author, creator and subject.
Scott, Gerald (2017-04-12);In clinical psychology the term prosthetic environment is used to describe a situation in which a client’s surroundings and interactions are mediated by caregivers to account for psysio/socio/cognitive deficits or differences. ...
Schnaidt, Matthew C. L. (Monterey, California. Naval Postgraduate School, 1998-12);The Management System for Heterogeneous Networks (MSHN) requires the gathering of resource usage information of applications that run within the MSHN system and status information of the resources within the scope of the ...
Abrams, Howard Allan (Monterey, California. Naval Postgraduate School, 1999-12);Eventually there will exist virtual environments inhabited by millions, but as virtual environments grow in size and number of entities, many problems emerge. Because of these problems, increasing attention is being brought ...