Misconfigurations discovery between distributed security components using the mobile agent approach.
Fakher Ben FtimaKamel KarouiHenda Ben GhézalaPublished in: iiWAS (2009)
Keyphrases
- mobile agents
- mobile agent system
- distributed systems
- network management
- distributed data mining
- client server
- mobile agent technology
- distributed computing
- computing environments
- agent technology
- fault tolerant
- load balancing
- network connection
- mobile computing
- security policies
- fault tolerance
- knowledge discovery
- information security
- intelligent agents
- intrusion detection
- intelligent mobile
- peer to peer
- security requirements
- security issues
- loosely coupled
- access control
- communication networks
- distributed environment
- mobile users
- data mining