dc.contributor.author |
Vaish, Abhishek
|
|
dc.contributor.author |
Jha, Anand Sanjeev Kumar Atul Krishna
|
|
dc.date.accessioned |
2019-07-04T05:44:58Z |
|
dc.date.available |
2019-07-04T05:44:58Z |
|
dc.date.issued |
2012-02-28 |
|
dc.identifier.uri |
http://onlineresource.ucsy.edu.mm/handle/123456789/433 |
|
dc.description.abstract |
The main area of discussion of our paper “Security of
Mobile Agent” is on the host platform attacking the
mobile agents. Malicious host is a system in network
which can take advantage of a mobile agent. A
malicious host can attack the agent and modify, steal
corrupting its code or state. It can deny services, return
false results or even terminate it completely. Providing
security against the host is difficult because the host
needs to have the full information of the code and the
state in order to execute the agent. We have
implemented a new strategy security mode to secure our
mobile agent such that its code is protected on
channel/host so that no malicious or third party can
access it and the confidentiality may be preserved and
ultimately working on the problem of host attacking the
agent. Our code is assembled in executable form at run
time so that execution platform cannot get enough time
to understand it. This technique is motivated from
obfuscation technique and tries to reduce the coherent
problem of trade off. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
Tenth International Conference On Computer Applications (ICCA 2012) |
en_US |
dc.title |
A Novel Approach To Achieve Optimized Obfuscation Technique For Mobile Agent. |
en_US |
dc.type |
Article |
en_US |