• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 43,141
Next 10 →

Table 1: Security Properties for Verification UNIX Agent Security Properties 1. The agent and server shall be capable of secure communication

in Security Verification Techniques Applied to PatchLink COTS Software
by David P. Gilliam, John D. Powell, Matt Bishop, Chris Andrew
"... In PAGE 2: ... The goals for the test were two-fold: 1) Verify the viability of performing model checking on the design and then performing testing on the code, working from the property specifications of the model for the Model-Based Verification (MBV) instrument and the property specifications for the PBT instrument. 2) Verify the PatchLink UNIX agent for the security properties shown in Table1 . The end objective was ... ..."

Table 1: Properties of mobile agent systems

in Campus - an Agent-based Platform for Distance Education
by Dirk Westhoff, Claus Unger

Table 1: Security Attacks Classification

in A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks
by Bing Wu, Jianmin Chen, Jie Wu, Mihaela Cardei
"... In PAGE 3: ... A passive attack obtains data exchanged in the network without disrupting the operation of the communications, while an active attack involves information interruption, mod- ification, or fabrication, thereby disrupting the normal functionality of a MANET. Table1 shows the general taxonomy of security attacks against MANET. Exam- ples of passive attacks are eavesdropping, traffic analysis, and traffic monitoring.... ..."

Table 17.5: Security Aspects of Applet and Mobile Agent Environments.

in Chapter 17 Agent Safety and Security
by Cu Ri Ty, David Goldschlag, Michael Reed 1996
Cited by 1

Table 17.5: Security Aspects of Applet and Mobile Agent Environments.

in Introduction Chapter 17 Agent Safety and Security
by David Goldschlag, Carl Landwehr, Michael Reed

Table 3. Defense against attacks.

in Abstract
by Patroklos G. Argyroudis
"... In PAGE 28: ... In reality, given the highly dynamic nature of ad hoc networks and the different scenarios of their application, for example utilizing some infrastructure or being completely infrastructureless, it is difficult to design a general solution that can provide adequate protection against all kinds of attacks in all possible application scenarios, with acceptable requirements and overhead. Table3 provides a comparison of the surveyed secure routing solutions in respect to the different attacks. 5.... ..."

Table 1: Threats to Internet mobile agents from attacking agent platforms, and MASHIn countermeasures.

in Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept
by Michelangelo Giansiracusa, Selwyn Russell, Andrew Clark, Volker Roth
"... In PAGE 5: ...Threats and Countermeasures Table1 presents some threats to Internet mobile agents from malicious agent platforms that can be (by the countermeasures listed) strongly mitigated in the MASH infrastructure. Table 1: Threats to Internet mobile agents from attacking agent platforms, and MASHIn countermeasures.... ..."

Table 1. Anonymity properties provided by Crowds Attacker Sender anonymity Receiver anonymity

in Crowds: Anonymity for web transactions
by Michael K. Reiter, Aviel D. Rubin 1998
"... In PAGE 4: ... However, if the same LAN also serves the end server, then the eavesdropper is e ectively global, and we provide no protections against it. The security o ered against each of these types of attackers is summarized in Table1 and justi ed in the remainder of the paper. As indicated by the omission of an \unlinkability of sender and receiver quot; column from this table, our system serves primarily to hide the sender or receiver from the attacker.... ..."
Cited by 445

Table 2: Packet Sizes for Mobile agents and RMI

in Using Mobile Agents for Network Performance
by Management Bohoris Pavlou, C. Bohoris, G. Pavlou, H. Cruickshank 2000
"... In PAGE 14: ... Each time, the payload of the TCP packets was measured. The results (in bytes) can be seen in Table2 while a graph of the above results can be seen in Figure 8. It is interesting to see from these results that the proprietary Grasshopper protocol incurs the least traffic, while packet sizes decrease as we move from Grasshopper over RMI to RMI and CORBA respectively.... ..."
Cited by 21

Table 1 Comparison of Mogent and other Java-based mobile Agent systems in security aspect

in unknown title
by unknown authors
Next 10 →
Results 1 - 10 of 43,141
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University