Results 1 - 10
of
43,141
Table 1: Security Properties for Verification UNIX Agent Security Properties 1. The agent and server shall be capable of secure communication
"... In PAGE 2: ... The goals for the test were two-fold: 1) Verify the viability of performing model checking on the design and then performing testing on the code, working from the property specifications of the model for the Model-Based Verification (MBV) instrument and the property specifications for the PBT instrument. 2) Verify the PatchLink UNIX agent for the security properties shown in Table1 . The end objective was ... ..."
Table 1: Properties of mobile agent systems
Table 1: Security Attacks Classification
"... In PAGE 3: ... A passive attack obtains data exchanged in the network without disrupting the operation of the communications, while an active attack involves information interruption, mod- ification, or fabrication, thereby disrupting the normal functionality of a MANET. Table1 shows the general taxonomy of security attacks against MANET. Exam- ples of passive attacks are eavesdropping, traffic analysis, and traffic monitoring.... ..."
Table 17.5: Security Aspects of Applet and Mobile Agent Environments.
1996
Cited by 1
Table 17.5: Security Aspects of Applet and Mobile Agent Environments.
Table 3. Defense against attacks.
in Abstract
"... In PAGE 28: ... In reality, given the highly dynamic nature of ad hoc networks and the different scenarios of their application, for example utilizing some infrastructure or being completely infrastructureless, it is difficult to design a general solution that can provide adequate protection against all kinds of attacks in all possible application scenarios, with acceptable requirements and overhead. Table3 provides a comparison of the surveyed secure routing solutions in respect to the different attacks. 5.... ..."
Table 1: Threats to Internet mobile agents from attacking agent platforms, and MASHIn countermeasures.
"... In PAGE 5: ...Threats and Countermeasures Table1 presents some threats to Internet mobile agents from malicious agent platforms that can be (by the countermeasures listed) strongly mitigated in the MASH infrastructure. Table 1: Threats to Internet mobile agents from attacking agent platforms, and MASHIn countermeasures.... ..."
Table 1. Anonymity properties provided by Crowds Attacker Sender anonymity Receiver anonymity
1998
"... In PAGE 4: ... However, if the same LAN also serves the end server, then the eavesdropper is e ectively global, and we provide no protections against it. The security o ered against each of these types of attackers is summarized in Table1 and justi ed in the remainder of the paper. As indicated by the omission of an \unlinkability of sender and receiver quot; column from this table, our system serves primarily to hide the sender or receiver from the attacker.... ..."
Cited by 445
Table 2: Packet Sizes for Mobile agents and RMI
2000
"... In PAGE 14: ... Each time, the payload of the TCP packets was measured. The results (in bytes) can be seen in Table2 while a graph of the above results can be seen in Figure 8. It is interesting to see from these results that the proprietary Grasshopper protocol incurs the least traffic, while packet sizes decrease as we move from Grasshopper over RMI to RMI and CORBA respectively.... ..."
Cited by 21
Table 1 Comparison of Mogent and other Java-based mobile Agent systems in security aspect
Results 1 - 10
of
43,141