000 | 04097nam a22005535i 4500 | ||
---|---|---|---|
001 | 978-3-540-68671-2 | ||
003 | DE-He213 | ||
005 | 20160624102051.0 | ||
007 | cr nn 008mamaa | ||
008 | 121227s1998 gw | s |||| 0|eng d | ||
020 |
_a9783540686712 _9978-3-540-68671-2 |
||
024 | 7 |
_a10.1007/3-540-68671-1 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.82 _223 |
245 | 1 | 0 |
_aMobile Agents and Security _h[electronic resource] / _cedited by Giovanni Vigna. |
260 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c1998. |
|
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c1998. |
|
300 |
_aXII, 257 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v1419 |
|
505 | 0 | _aFoundations -- Security Issues in Mobile Code Systems -- Environmental Key Generation Towards Clueless Agents -- Language Issues in Mobile Program Security -- Protecting Mobile Agents Against Malicious Hosts -- Security Mechanisms -- Safe, Untrusted Agents Using Proof-Carrying Code -- Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts -- Authentication for Mobile Agents -- Cryptographic Traces for Mobile Agents -- Mobile Code Systems -- D’Agents: Security in a Multiple-Language, Mobile-Agent System -- A Security Model for Aglets -- Signing, Sealing, and Guarding Java™ Objects -- Active Content and Security -- The Safe-Tcl Security Model -- Web Browsers and Security. | |
520 | _aNew paradigms can popularize old technologies. A new \standalone" paradigm, the electronic desktop, popularized the personal computer. A new \connected" paradigm, the web browser, popularized the Internet. Another new paradigm, the mobile agent, may further popularize the Internet by giving people greater access to it with less eort. MobileAgentParadigm The mobile agent paradigm integrates a network of computers in a novel way designed to simplify the development of network applications. To an application developer the computers appear to form an electronic world of places occupied by agents. Each agent or place in the electronic world has the authority of an individual or an organization in the physical world. The authority can be established, for example, cryptographically. A mobile agent can travel from one place to another subject to the des- nation place’s approval. The source and destination places can be in the same computer or in di erent computers. In either case,the agentinitiates the trip by executing a \go" instruction which takes as an argument the name or address of the destination place. The next instruction in the agent’s program is executed in the destination place, rather than in the source place. Thus, in a sense, the mobile agent paradigm reduces networking to a program instruction. A mobile agent can interact programmatically with the places it visits and, if the other agents approve, with the other agents it encounters in those places. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer Communication Networks. | |
650 | 0 | _aOperating systems (Computers). | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aArtificial intelligence. | |
650 | 0 | _aInformation Systems. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aData Encryption. |
650 | 2 | 4 | _aOperating Systems. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aArtificial Intelligence (incl. Robotics). |
650 | 2 | 4 | _aManagement of Computing and Information Systems. |
700 | 1 |
_aVigna, Giovanni. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783540647928 |
786 | _dSpringer | ||
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v1419 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/3-540-68671-1 |
942 |
_2EBK7047 _cEBK |
||
999 |
_c36341 _d36341 |