Book Cover
Book

Title Mobile agents and security / Giovanni Vigna, ed
Published Berlin ; New York : Springer, [1998]
©1998

Copies

Location Call no. Vol. Availability
 W'PONDS  005.8 Vig/Maa  AVAILABLE
Description xii, 256 pages : illustrations ; 24 cm
Series Lecture notes in computer science, 0302-9743 ; 1419
Lecture notes in computer science ; 1419
Contents Security Issues in Mobile Code Systems / David M. Chess -- Environmental Key Generation Towards Clueless Agents / James Riordan and Bruce Schneier -- Language Issues in Mobile Program Security / Dennis Volpano and Geoffrey Smith -- Protecting Mobile Agents Against Malicious Hosts / Tomas Sander and Christian F. Tschudin -- Safe, Untrusted Agents Using Proof-Carrying Code / George C. Necula and Peter Lee -- Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts / Fritz Hohl -- Authentication for Mobile Agents / Shimshon Berkovits, Joshua D. Guttman and Vipin Swarup -- Cryptographic Traces for Mobile Agents / Giovanni Vigna -- D'Agents: Security in a Multiple-Language, Mobile-Agent System / Robert S. Gray, David Kotz and George Cybenko [et al.] -- A Security Model for Aglets / Gunter Karjoth, Danny B. Lange and Mitsuru Oshima -- Signing, Sealing, and Guarding Java Objects / Li Gong and Roland Schemers
The Safe-Tcl Security Model / John K. Ousterhout, Jacob Y. Lery and Brent B. Welch -- Web Browsers and Security / Flavio De Paoli, Andre L. Dos Santos and Richard A. Kemmerer
Summary The mobile agents paradigm integrates a network of computers in a novel way and, in a certain sense, reduces networking to program construction. A mobile agent can travel from one place to another and, subject to the destination's approval, interact programmatically with the place it visits. Besides a good deal of promise, mobile agents also introduce new problems. Most of these problems have to do with security and safety. Some of the security concerns have been studied by the distributed systems community and cryptologists for a long time, but mechanisms and technologies developed to secure communication and control access to resources must be adapted to take into account mobility and protection of mobile agents from malicious hosts
Notes ANALYTIC
Bibliography Includes bibliographical references and index
Notes Also available via the World Wide Web
English
Print version record
Lecture notes in computer science no:1419 0302-9743
Subject Computer security.
Electronic data processing -- Distributed processing -- Security measures.
Intelligent agents (Computer software) -- Security measures.
Mobile agents (Computer software)
Author Vigna, Giovanni.
LC no. 98036069
ISBN 3540647929 (softcover : acid-free paper)