Secure agent data integrity shield
نویسندگان
چکیده
منابع مشابه
Secure agent data integrity shield
In the rapidly expanding field of E-Commerce, mobile agent is the emerging technology that addresses the requirement of intelligent filtering/processing of information. This paper will address the area of mobile agent data integrity protection. We propose the use of Secure Agent Data Integrity Shield (SADIS) as a scheme that protects the integrity of data collected during agent roaming. With th...
متن کاملData Integrity Limitations in Highly Secure Systems
We discuss a class of computer/network architectures that supports multilevel security while utilizing commercial-off-the-shelf (COTS) workstations and COTS productivity software applications. We show that a property of these architectures is that, while supporting multilevel confidentiality policies, they do not generally support partially ordered integrity policies: specifically, these archit...
متن کاملIntegrity Protection of Mobile Agent Data
introduction One hindrance to the widespread adoption of mobile-agent technology is the lack of security. Security will be the issue that has to be addressed carefully if mobile agents are to be used in the field of electronic commerce. SAFER (secure agent fabrication, evolution and roaming) is a mobile-agent framework that is specially designed for the purpose of electronic commerce (Guan buil...
متن کاملMobile Agent Data Integrity Using Multi-agent Architecture
Protection of agent data state and partial results in mobile agent systems continues to draw research interest. Current solutions to integrity attacks are geared at detection of malicious activity a posteriori. We propose multi-agent architecture that uses cooperating multi-hop and single-hop agents to prevent such attacks and discuss security features of our scheme. We also examine data protec...
متن کاملCluster Enhanced Secure Authentication Scheme for Data Integrity in Manet
Mobile ad hoc networks (MANETs) consist of wireless mobile nodes that can dynamically and freely selforganize into arbitrary and temporary ad hoc network topologies. Due to high mobility of nodes, there exist frequent link breakages which lead to frequent path failures and route discoveries. In a route discovery, both cluster and broadcasting scheme is deployed, where a mobile node blindly rebr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronic Commerce Research and Applications
سال: 2004
ISSN: 1567-4223
DOI: 10.1016/j.elerap.2003.12.001