An approach to mobile agent security in Java
Virden, Roy John
Volpano, Dennis M.
Ludlow, Nelson D.
MetadataShow full item record
For many years, people have talked about the advantages of programs that can roam networks and provide services for a client. The programs, called agents, have many military applications as well. Among them, for instance, is data mining, where an agent is dispatched to find information for a client. There are security risks associated with agents. For instance, in the data mining example, a client must be able to trust the information returned. If a trusted node in a network can be spoofed, then an untrusted node can easily corrupt the results of the mining operation. This thesis presents a protocol to guard against this sort of attack. The protocol assumes that every trusted host knows all other trusted hosts. Though unrealistic for some commercial applications, it seems like a reasonable assumption for military applications.
Approved for public release; distribution is unlimited
Showing items related by title, author, creator and subject.
Scott, Gerald (2017-04-12);In clinical psychology the term prosthetic environment is used to describe a situation in which a client’s surroundings and interactions are mediated by caregivers to account for psysio/socio/cognitive deficits or differences. ...
Schnaidt, Matthew C. L. (Monterey, California. Naval Postgraduate School, 1998-12);The Management System for Heterogeneous Networks (MSHN) requires the gathering of resource usage information of applications that run within the MSHN system and status information of the resources within the scope of the ...
Allen, Bruce (2002-07); NPS-CS-02-002These instructions describe how to build a diskless client with dedicated user storage on the server. The diskless Linux client is organized to provide read-write files over NFS at /home, read-only files over NFS for ...