Return to search

Mobile agent security and reliability issues in electronic commerce.

Chan, Hing-wing. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2000. / Includes bibliographical references (leaves 76-79). / Abstracts in English and Chinese. / Abstract --- p.i / Abstract (Chinese) --- p.ii / Acknowledgements --- p.iii / Contents --- p.iv / List of Figures --- p.vii / List of Tables --- p.viii / Chapter Chapter 1. --- Introduction --- p.1 / Chapter 1.1. --- Mobile Agents and the Problems --- p.1 / Chapter 1.2. --- Approach --- p.3 / Chapter 1.3. --- Contributions --- p.3 / Chapter 1.4. --- Organization of This Thesis --- p.4 / Chapter Chapter 2. --- The Mobile Code Paradigm --- p.6 / Chapter 2.1. --- Mobile Code: an Alternative to Client/Servers --- p.6 / Chapter 2.1.1. --- Classification of Mobile Codes --- p.8 / Chapter 2.1.2. --- Applications of Mobile Code Paradigms --- p.10 / Chapter 2.1.3. --- Supporting Implementation Technologies --- p.11 / Chapter 2.2. --- The Problems of Mobile Code --- p.13 / Chapter 2.2.1. --- Security Issues in Distributed Systems --- p.13 / Chapter 2.2.2. --- Security Concerns of Mobile Code Paradigms --- p.15 / Chapter 2.2.2.1. --- Security Attacks --- p.15 / Chapter 2.2.2.2. --- Security Mechanisms --- p.17 / Chapter 2.2.2.3. --- A Security Comparison between Paradigms --- p.20 / Chapter 2.2.3. --- Security Features of Implementation Technologies --- p.20 / Chapter 2.2.3.1. --- Security Services of Message-based Technology --- p.21 / Chapter 2.2.3.2. --- Security Services of Object-based Technology --- p.21 / Chapter 2.2.3.3. --- Security Services of Mobile Technology --- p.22 / Chapter 2.2.3.4. --- A Comparison of Technologies on Security Services --- p.22 / Chapter 2.3. --- Chapter Summary --- p.23 / Chapter Chapter 3. --- "Mobile Agents, Its Security and Reliability Issues" --- p.24 / Chapter 3.1. --- Advantages and Applications of Mobile Agents --- p.24 / Chapter 3.2. --- Security Concerns of Mobile Agents --- p.26 / Chapter 3.2.1. --- Host Security --- p.27 / Chapter 3.2.2. --- Agent Security --- p.27 / Chapter 3.3. --- Techniques to Protect Mobile Agents --- p.29 / Chapter 3.3.1. --- Protected Agent States --- p.29 / Chapter 3.3.2. --- Mobile Cryptography --- p.30 / Chapter 3.4. --- Reliability Concerns of Mobile Agents --- p.31 / Chapter Chapter 4. --- Security and Reliability Modeling for Mobile Agents --- p.32 / Chapter 4.1. --- Attack Model and Scenarios --- p.33 / Chapter 4.2. --- General Security Models --- p.34 / Chapter 4.2.1. --- Security and Reliability --- p.34 / Chapter 4.2.2. --- Deriving Security Models --- p.36 / Chapter 4.2.3. --- The Time-to-Effort Function --- p.38 / Chapter 4.3. --- A Security Model for Mobile Agents --- p.40 / Chapter 4.4. --- Discussion of the Proposed Model --- p.43 / Chapter 4.5. --- A Reliability Model for Mobile Agents --- p.43 / Chapter Chapter 5. --- The Concordia Mobile Agent Platform --- p.46 / Chapter 5.1. --- Overview --- p.46 / Chapter 5.2. --- Special Features --- p.47 / Chapter Chapter 6. --- SIAS: A Shopping Information Agent System --- p.49 / Chapter 6.1. --- What the System Does --- p.49 / Chapter 6.2. --- System Design --- p.50 / Chapter 6.2.1. --- Object Description --- p.50 / Chapter 6.2.2. --- Flow Description --- p.52 / Chapter 6.3. --- Implementation --- p.53 / Chapter 6.3.1. --- Choice of Programming Language --- p.53 / Chapter 6.3.2. --- Choice of Mobile Agent Platform --- p.53 / Chapter 6.3.3. --- Other Implementation Details --- p.54 / Chapter 6.4. --- Snapshots --- p.54 / Chapter 6.5. --- Security Design of SIAS --- p.57 / Chapter 6.5.1. --- Security Problems of SIAS --- p.58 / Chapter 6.5.2. --- Our Solutions to the Problems --- p.60 / Chapter 6.5.3. --- Evaluation of the Secure SIAS --- p.64 / Chapter 6.5.3.1. --- Security Analysis --- p.64 / Chapter 6.5.3.2. --- Performance Vs Query Size --- p.65 / Chapter 6.5.3.3. --- Performance Vs Number of Hosts --- p.67 / Chapter 6.6. --- Reliability Design of SIAS --- p.69 / Chapter 6.6.1. --- Reliability Problems of SIAS --- p.69 / Chapter 6.6.2. --- Our Solutions to the Problems --- p.70 / Chapter 6.6.3. --- Evaluation of the Reliable SIAS --- p.71 / Chapter Chapter 7. --- Conclusions and Future Work --- p.73 / Bibliography --- p.76

Identiferoai:union.ndltd.org:cuhk.edu.hk/oai:cuhk-dr:cuhk_323203
Date January 2000
ContributorsChan, Hing-wing., Chinese University of Hong Kong Graduate School. Division of Computer Science and Engineering.
Source SetsThe Chinese University of Hong Kong
LanguageEnglish, Chinese
Detected LanguageEnglish
TypeText, bibliography
Formatprint, viii, 79 leaves : ill. ; 30 cm.
RightsUse of this resource is governed by the terms and conditions of the Creative Commons “Attribution-NonCommercial-NoDerivatives 4.0 International” License (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Page generated in 0.002 seconds