A Framework to Protect Mobile Agents by using Reference States

نویسنده

  • Fritz Hohl
چکیده

To protect mobile agents from attacks by their execution environments, or hosts, one class of protection mechanisms uses “reference states” to detect modification attacks. Reference states are agent states that have been produced by non-attacking, or reference hosts. This paper examines this class of mechanisms and presents the bandwidth of the achieved protection. First, the notion of reference states is introduced. This notion allows to define a protection scheme that can be used to realize a whole class of mechanisms to protect mobile agents. To do so, after an initial analysis of already existing approaches, the abstract features of these approaches are extracted. A discussion examines the strengths and weaknesses of the general protection scheme, and a framework is presented that allows an agent programmer to choose an appropriate protection level using this scheme. An example illustrates the usage of the framework and its overhead.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Protocol to Detect Malicious Hosts Attacks by Using Reference States

To protect mobile agents from attacks by their execution environments, or hosts, one class of protection mechanisms uses “reference states” to detect modification attacks. Reference states are agent states that have been produced by non-attacking, or reference hosts. This paper presents a new protocol using reference states by modifying an existing approach, called “traces”. In contrast to the ...

متن کامل

Assessment of the Effects of Economic Sanctions on Iranians’ Right to Health by Using Human Rights Impact Assessment Tool: A Systematic Review

Background Over the years, economic sanctions have contributed to violation of right to health in target countries. Iran has been under comprehensive unilateral economic sanctions by groups of countries (not United Nations [UN]) in recent years. They have been intensified from 2012 because of international community’s uncertainty about peaceful purpose of Iran’s nuclear program and inadequacy o...

متن کامل

Leveraging Engaged Parties in SIP Domains of eTOM Framework by using ITSM Reference Model

the telecommunications industry plays an important role in providing ICT services to a wide range of customers. In addition to individual customers, corporate customers also are user of these services and have an important role to make return on investment for telecom companies (Telcos). Therefore, this group of customers should not be ignored by any reason. This is where the Telecom Companies ...

متن کامل

ارائه یک رویکرد همانند سازی شده عامل محور در اجرای یک الگوی کد متحرک مطمئن

Abstract Using mobile agents, it is possible to bring the code close to the resources, which is not foreseen by the traditional client/server paradigm. Compared to the client/server computing paradigm, the greater flexibility of the mobile agent paradigm comes at additional costs as well as the additional complexity of developing and managing mobile agent-based applications. Such complexity ...

متن کامل

Framework for Securing Mobile Software Agents

Information systems are growing in size and complexity making it infeasible for human administrators to manage them. The aim of this work is to study ways of securing and using mobile software agents to deter attackers, protect information systems, detect intrusions, automatically respond to the intrusions and attacks, and to produce recovery services to systems after attacks. Current systems p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000