Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
 
<< vorige    volgende >>
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
           Alle artikelen van de bijbehorende aflevering
                                       Details van artikel 3 van 49 gevonden artikelen
 
 
  A Flexible and Reliable Architecture for Mobile Agent Security
 
 
Titel: A Flexible and Reliable Architecture for Mobile Agent Security
Auteur: Ghossoon M.W. Al-Saadoon
Verschenen in: Journal of computer science
Paginering: Jaargang 5 (2009) nr. 4 pagina's 270-274
Jaar: 2009
Inhoud: Problem statement: Wireless application protocol is a protocol that makes it possible to surf the Internet from a cellular phone or other handheld wireless. Many of us that surf the Internet from home with a 56 kbps modem think that it is slow and a cell phone only uses 9.6 kbps so WAP has to take the lesser bandwidth into consideration. For this reason, this study proposed a flexible and reliable system to be implemented by using the characteristic of agents “mobile agent” through wireless application protocol for identification of distributed Intruder. The problem appears when the limitation of data transfer when the distributed systems are used (which includes the heterogeneous database) through internet. For this reason the suggested approach will be the solution to the problem of WAP for mobile agent. Approach: The purpose of this study was to present the ability for dispatch mobile agent from a host to carry out operations directly to the remote point of interest, thus agent’s scans provide an appropriate response which is faster than a hierarchical IDS that communicates with a central coordinator based elsewhere on the network. Results: The methodology was used in order to understand the mobile agent mechanism and will introduce the distributed computing mechanisms that are intended for large scale distributed systems. Since the distributed security agent models system was built using mobile agent and net, this will develop small applications for data stores, like sequential query language server. The method used the algorithms built refer to each part of the structure and the rules that implemented (users and the security agent system roles). The result was simulating the intended for business roles for both commercial and government modules, which included the solutionto the problem and to architecture to be more flexible and reliable. Conclusion/Recommendations: One of main conclusion for the mobile agent used WAP protocol: To make this protocol secure when transmit the messages in the distributed system using agents chrematistics and Interaction with security agent is multi-mode providing hassle-free access to the user. Security agent alerted the users based ontheir alert rules. This study had new approach and idea in implementation, also presented the ability to dispatch mobile agent from a host to carry out operations directly to the remote point of interest, thus agent’s scans provide an appropriate response which is faster than a hierarchical IDS that communicates with a central coordinator based elsewhere on the network.
Uitgever: Science Publications (provided by DOAJ)
Bronbestand: Elektronische Wetenschappelijke Tijdschriften
 
 

                             Details van artikel 3 van 49 gevonden artikelen
 
<< vorige    volgende >>
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland