APPLICATION FOR MOBILE AGENT TO ACCESS MYSQL
نویسندگان
چکیده
منابع مشابه
Application Security Models for Mobile Agent Systems
Mobile agents are a distributed computing paradigm based on mobile autonomous programs. Mobile applications must balance security requirements with available security mechanisms in order to meet application level security goals. We introduce a trust framework to reason about application security requirements, trust expression, and agent protection mechanisms. We develop application security mod...
متن کاملCore Role Based Access Control (RBAC) mechanism for MySQL
RBAC or Role-Based Access Control is an approach to restrict system access to authorized users and help in implementing a secure access control for larger databases. MySQL is a popular open source relational database management system (RDBMS) which currently implements MAC and DAC access control mechanisms. We extend the access control policies in MySQL by adding the Core RBAC functionality to it.
متن کاملA prototype mobile-agent application
Mobile agents, a relatively new paradigm for distributed software development, has become an accessible technology in recent years. The potential bene-ts of this paradigm, including the reduction of network bandwidth consumption and latency, promise to revolutionize distributed applications A number of research institutions and industrial entities have engaged in the development of elaborate su...
متن کاملConsistent and Recoverable Agent-Based Access to Heterogeneous Mobile Databases
Today's information applications have a functional need to distribute themselves among numerous remote sites through both wireless and wired links. To overcome the communication barrier and support the development of complex applications, traditionall:J~delsof distributed computing need to be revised. In this paper, we advocate an approach ba.:'l'd on agents, which arc software modules that enc...
متن کاملAn Automated Agent-Based Marketplace For Mobile Internet Access
1 Introduction 1.1 Abstract In our mobile society it is desirable to have access to the Internet and private networks from abroad. Thanks to new technologies such as Wireless LANs and mobile phones this is possible with increasing tendencies in many areas. Traditionally one would make a long-term contract with an ISP and then be able to use its and the roaming partner's access points. In the co...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IJID (International Journal on Informatics for Development)
سال: 2017
ISSN: 2549-7448,2252-7834
DOI: 10.14421/ijid.2012.01204