Using mobile agents as roaming security guards to test and improve security of hosts and networks.
Marco M. CarvalhoThomas B. CowinNiranjan SuriMaggie R. BreedyKenneth M. FordPublished in: SAC (2004)
Keyphrases
- mobile agents
- mobile agent system
- network management
- network connection
- black hole search
- mobile users
- intrusion detection
- security requirements
- network security
- access control
- mobile agent technology
- security policies
- client server
- load balancing
- distributed systems
- distributed computing
- computing environments
- fault tolerance
- security mechanisms
- mobile computing
- key management
- network nodes
- security issues
- network traffic
- cloud computing