000 04320nam a22006375i 4500
001 978-3-540-68671-2
003 DE-He213
005 20240423132556.0
007 cr nn 008mamaa
008 121227s1998 gw | s |||| 0|eng d
020 _a9783540686712
_9978-3-540-68671-2
024 7 _a10.1007/3-540-68671-1
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
245 1 0 _aMobile Agents and Security
_h[electronic resource] /
_cedited by Giovanni Vigna.
250 _a1st ed. 1998.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c1998.
300 _aXII, 257 p. 8 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v1419
505 0 _aFoundations -- Security Issues in Mobile Code Systems -- Environmental Key Generation Towards Clueless Agents -- Language Issues in Mobile Program Security -- Protecting Mobile Agents Against Malicious Hosts -- Security Mechanisms -- Safe, Untrusted Agents Using Proof-Carrying Code -- Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts -- Authentication for Mobile Agents -- Cryptographic Traces for Mobile Agents -- Mobile Code Systems -- D’Agents: Security in a Multiple-Language, Mobile-Agent System -- A Security Model for Aglets -- Signing, Sealing, and Guarding Java™ Objects -- Active Content and Security -- The Safe-Tcl Security Model -- Web Browsers and Security.
520 _aNew paradigms can popularize old technologies. A new \standalone" paradigm, the electronic desktop, popularized the personal computer. A new \connected" paradigm, the web browser, popularized the Internet. Another new paradigm, the mobile agent, may further popularize the Internet by giving people greater access to it with less eort. MobileAgentParadigm The mobile agent paradigm integrates a network of computers in a novel way designed to simplify the development of network applications. To an application developer the computers appear to form an electronic world of places occupied by agents. Each agent or place in the electronic world has the authority of an individual or an organization in the physical world. The authority can be established, for example, cryptographically. A mobile agent can travel from one place to another subject to the des- nation place’s approval. The source and destination places can be in the same computer or in di erent computers. In either case,the agentinitiates the trip by executing a \go" instruction which takes as an argument the name or address of the destination place. The next instruction in the agent’s program is executed in the destination place, rather than in the source place. Thus, in a sense, the mobile agent paradigm reduces networking to a program instruction. A mobile agent can interact programmatically with the places it visits and, if the other agents approve, with the other agents it encounters in those places.
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aOperating systems (Computers).
650 0 _aComputer networks .
650 0 _aArtificial intelligence.
650 0 _aElectronic data processing
_xManagement.
650 1 4 _aCryptology.
650 2 4 _aOperating Systems.
650 2 4 _aComputer Communication Networks.
650 2 4 _aArtificial Intelligence.
650 2 4 _aIT Operations.
700 1 _aVigna, Giovanni.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540647928
776 0 8 _iPrinted edition:
_z9783662209028
830 0 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v1419
856 4 0 _uhttps://doi.org/10.1007/3-540-68671-1
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
912 _aZDB-2-BAE
942 _cSPRINGER
999 _c189300
_d189300