Jini technology represents a significant step in the evolution of distributed computing, as a simple yet remarkably reliable and flexible infrastructure that enable all types of devices to simply connect into imprompt...
详细信息
ISBN:
(纸本)9729805024
Jini technology represents a significant step in the evolution of distributed computing, as a simple yet remarkably reliable and flexible infrastructure that enable all types of devices to simply connect into impromptu networks, making access to and delivery of new network services as simple as plugging in a telephone. Built on a top of Java software infrastructure, Jini technology enables all types of digital devices to work together in a community organised together without extensive planning, installation or human intervention. In Jini distributedsystems, Java programs interact spontaneously, enabling services to join or leave the network with ease and allowing clients to view and access available services with confidence. It is expected that Jini technology will make a big impact on embedded devices market by providing a highlevel, object-based protocol instead of low-level data exchange protocols. The paper presents some funding on the suitability of Jini technology for E-commerce applications. It also debates some security issues associated with Jini technology.
The proceedings contain 29 papers. The special focus in this conference is on Network securitysystems and Intrusion Detection. The topics include: An intelligent decision support system for intrusion detection and re...
ISBN:
(纸本)3540421033
The proceedings contain 29 papers. The special focus in this conference is on Network securitysystems and Intrusion Detection. The topics include: An intelligent decision support system for intrusion detection and response;mathematical models of the covert channels;open issues in formal methods for cryptographic protocol analysis;future directions in role-based access control models;secure networked computing;composability of secrecy;agent-based model of computer network security system;security considerations and models for service creation in premium IP networks;secure systems design technology;a privacy-enhancing e-business model based on infomediaries;modeling software tools complex for evaluation of information systems operation quality;analyzing separation of duties in petri net workflows;information security with formal immune networks;a biological approach to system information security;learning temporal regularities of user behavior for anomaly detection;the set and function approach to modeling authorization in distributedsystems;principles, models, and architecture;controlled operations as a cryptographic primitive;key distribution protocol based on noisy channel and error detecting codes;dynamic group key management protocol;SVD-based approach to transparent embedding data into digital images and fast encryption algorithm spectr-H64.
The proceedings contain 16 papers. The special focus in this conference is on Innovative Internet Computing systems. The topics include: Multicast protocols for jinni agents;modern software engineering methods for IP-...
ISBN:
(纸本)3540422757
The proceedings contain 16 papers. The special focus in this conference is on Innovative Internet Computing systems. The topics include: Multicast protocols for jinni agents;modern software engineering methods for IP-QOS resource pool management;adaptive quality of service management using QOS proxy and user feedback for wireless links;sharing extendible arrays in a distributed environment;integrating intelligent home automation systems to plug and play networks;reusing single-user applications to create multi-user internet applications;graph-theoretic web algorithms;prefetching tiled internet data using a neighbor selection Markov chain;a general adaptive cache coherency-replacement scheme for distributedsystems;agents based collaborative framework for b2c business model and related services;agent-based distributed computing with Jmessengers;agent-based wave computation;towards controlling the resource demand;a design for Jtrader, an internet trading service;computer-supported deliberations for distributed teams and hardware security concept for spontaneous network integration of mobile devices.
The proceedings contain 15 papers. The special focus in this conference is on Self-Stabilizing systems. The topics include: Cooperating mobile agents and stabilization;enforcement of fairness under unfair adversary;ea...
ISBN:
(纸本)3540426531
The proceedings contain 15 papers. The special focus in this conference is on Self-Stabilizing systems. The topics include: Cooperating mobile agents and stabilization;enforcement of fairness under unfair adversary;easy stabilization with an agent;stabilization of routing in directed networks;dijkstra’s self-stabilizing algorithm in unsupportive environments;communication adaptive self-stabilizing group membership service;the theory of weak stabilization;on the security and vulnerability of PING;a new efficient tool for the design of self-stabilizing l-exclusion algorithms;self-stabilizing agent traversal;a composite stabilizing data structure;stabilizing causal deterministic merge;fast self-stabilizing depth-first token circulation and on a space-optimal distributed traversal algorithm.
The proceedings contain 20 papers. The special focus in this conference is on Markets, security, Profiling and Business Interaction. The topics include: The next wave of internet-based applications;building comparison...
ISBN:
(纸本)9783540428787
The proceedings contain 20 papers. The special focus in this conference is on Markets, security, Profiling and Business Interaction. The topics include: The next wave of internet-based applications;building comparison-shopping brokers on the web;trusted mediation for e-service provision in electronic marketplaces;incentives for sharing in peer-to-peer networks;using smart cards for fair exchange;enabling privacy protection in e-commerce applications;an FCC spectrum auction simulator for autonomous bidding agents;a dynamic programming model for algorithm design in simultaneous auctions;multidimensional recommender systems;a multi-criteria taxonomy of business models in electronic commerce;integration of goods delivery supervision into e-commerce supply chain and scalable regulation of inter-enterprise electronic commerce.
Mobile computers and devices may operate in a variety of environments with different security schemes. In this paper, we present a mobile agent based security model. The model supports the flexible and extensible appl...
详细信息
Mobile computers and devices may operate in a variety of environments with different security schemes. In this paper, we present a mobile agent based security model. The model supports the flexible and extensible application specific security measures required by mobile computers and devices in distributed system. First, we gave a full description of mobile agent and its migration modes. After discussing the possible security threats, the model is explained at length and security analysis is also given in the way of collaboration requirements, mobility requirements and execution requirements.
Secure group communication is crucial for building distributed applications that work in dynamic environments and communicate over unsecured networks (e.g. the Internet). Key agreement is a critical part of providing ...
详细信息
ISBN:
(纸本)0769510779
Secure group communication is crucial for building distributed applications that work in dynamic environments and communicate over unsecured networks (e.g. the Internet). Key agreement is a critical part of providing security services for group communication systems. Most of the current contributory key agreement protocols are not designed to tolerate failures and membership changes during execution. In particular, nested or cascaded group membership events (such as partitions) are not accommodated. We present the first robust contributory key agreement protocols, resilient to any sequence of events while preserving the group communication membership and ordering guarantees.
Traditional distributed system services that provide guarantees related to confidentiality, integrity, and authenticity enhance security, but are not survivable since each attribute is implemented by a single method. ...
详细信息
Traditional distributed system services that provide guarantees related to confidentiality, integrity, and authenticity enhance security, but are not survivable since each attribute is implemented by a single method. This paper advocates the use of redundancy to increase survivability by using multiple methods to implement each security attribute and doing so in ways that can vary unpredictably. As a concrete example, the design and implementation of a highly configurable secure communication service called SecComm are presented. The service has been implemented using Cactus, a system for building highly configurable protocols and services for distributedsystems. Initial performance results for a prototype implementation on Linux are also given.
Intrusion detection research has been conducted for nearly 20 years but still remains in its infancy. The existing intrusion detection system architectures have a number of problems that limit their configurability, s...
详细信息
Intrusion detection research has been conducted for nearly 20 years but still remains in its infancy. The existing intrusion detection system architectures have a number of problems that limit their configurability, scalability, and efficiency. This paper first discusses the threats to networked computersystems, and introduces the intrusion detection mechanisms and agent technologies. On the basis of the above discussion, a multi-agent based intrusion detection architecture for LAN is proposed. This architecture can be easily extended and maintained, supporting distributed and intelligent intrusion detection. In addition, it can enhance the whole system detection efficiency greatly.
作者:
E. JamhourPPGIA
PUCPR-Pontifícia Universidade Católica do Paraná Brazil
Presently, many companies share business information by interconnecting their networks through the Internet. However, this advanced degree of connectivity also increases the network security management complexity. Mos...
详细信息
Presently, many companies share business information by interconnecting their networks through the Internet. However, this advanced degree of connectivity also increases the network security management complexity. Most of this complexity results form the need of controlling the connectivity of each network with respect to the others and the Internet. Also, it is necessary to take into account changes on users, shared resources and services, not only in the local network, but also in the interconnected networks. Because of these changes, network administrators are systematically confronted with firewall and other network elements reconfiguration. This paper proposes the use of a LDAP global directory service to simplify the task of managing the security in large-scale networks. By taking advantage of the distributed features of directory services, the paper defines a strategy for managing a group of interconnected networks as a single entity, without removing the administration autonomy of each independent network.
暂无评论