Empreu aquest identificador per citar o enllaçar aquest ítem:
http://hdl.handle.net/10609/17081
Registre complet de metadades
Camp DC | Valor | Llengua/Idioma |
---|---|---|
dc.contributor.author | Garrigues, Carles | - |
dc.contributor.author | Migas, Nikos | - |
dc.contributor.author | Buchanan, William | - |
dc.contributor.author | Robles Martínez, Sergi | - |
dc.contributor.author | Borrell Viader, Joan | - |
dc.date.accessioned | 2012-10-22T17:21:10Z | - |
dc.date.available | 2012-10-22T17:21:10Z | - |
dc.date.issued | 2009-02 | - |
dc.identifier.citation | Garrigues, C.; Migas, N.; Buchanan, W.; Robles, S.; Borrell, J. (2009).Protecting mobile agents from external replay attacks. Journal of Systems and Software, 82(2). p. 197-206 ISSN:0164-1212 | - |
dc.identifier.uri | http://hdl.handle.net/10609/17081 | - |
dc.description.abstract | This paper presents a protocol for the protection of mobile agents against external replay attacks. This kind of attacks are performed by malicious platforms when dispatching an agent multiple times to a remote host, thus making it reexecute part of its itinerary. Current proposals aiming to address this problem are based on storing agent identifiers, or trip markers, inside agent platforms, so that future reexecutions can be detected and prevented. The problem of these solutions is that they do not allow the agent to perform legal migrations to the same platform several times. The aim of this paper is to address these issues by presenting a novel solution based on authorisation entities, which allow the agent to be reexecuted on the same platform a number of times determined at runtime. The proposed protocol is secure under the assumption that authorisation entities are trusted. | en |
dc.format.mimetype | application/pdf | - |
dc.language.iso | eng | - |
dc.publisher | Elsevier | - |
dc.relation.ispartofseries | 82:2 | - |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/es/ | - |
dc.subject | Mobile agents | en |
dc.subject | Security | en |
dc.subject | Malicious hosts | en |
dc.subject | Replay attacks | en |
dc.subject | Trip marker | en |
dc.subject | agentes móviles | es |
dc.subject | agents mòbils | ca |
dc.subject | seguridad | es |
dc.subject | seguretat | ca |
dc.subject | hosts maliciosos | es |
dc.subject | hosts malignes | ca |
dc.subject | ataques de repetición | es |
dc.subject | atacs de repetició | ca |
dc.title | Protecting mobile agents from external replay attacks | - |
dc.type | info:eu-repo/semantics/article | - |
dc.audience.mediator | Theme areas::Computer Science, Technology and Multimedia | en |
dc.description.version | Preprint | - |
dc.gir.id | AR/0000001835 | - |
Apareix a les col·leccions: | Articles cientÍfics Articles |
Arxius per aquest ítem:
Arxiu | Descripció | Mida | Format | |
---|---|---|---|---|
Garrigues_JSS2009_Protecting.pdf | Artículo principal | 246,54 kB | Adobe PDF | Veure/Obrir |
Comparteix:
Aquest ítem està subjecte a una llicència de Creative Commons Llicència Creative Commons