by Mo Chun Man. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2001. / Includes bibliographical references (leaves 72-80). / Abstracts in English and Chinese. / Chapter 1 --- INTRODUCTION --- p.1 / Chapter 1.1 --- The Mobile Agents --- p.2 / Chapter 1.2 --- The Mobile Agent Paradigm --- p.4 / Chapter 1.2.1 --- Initiatives --- p.5 / Chapter 1.2.2 --- Applications --- p.7 / Chapter 1.3 --- The Mobile Agent S ystem --- p.8 / Chapter 1.4 --- Security in Mobile Agent System --- p.9 / Chapter 1.5 --- Thesis Organization --- p.11 / Chapter 2 --- BACKGROUND AND FOUNDATIONS --- p.12 / Chapter 2.1 --- Encryption/Decryption --- p.12 / Chapter 2.2 --- One-way Hash Function --- p.13 / Chapter 2.3 --- Message Authentication Code (MAC) --- p.13 / Chapter 2.4 --- Homomorphic Encryption Scheme --- p.14 / Chapter 2.5 --- One-Round Oblivious Transfer --- p.14 / Chapter 2.6 --- Polynomial-time Algorithms --- p.14 / Chapter 2.7 --- Circuit --- p.15 / Chapter 3 --- SURVEY OF PROTECTION SCHEMES ON MOBILE AGENTS --- p.16 / Chapter 3.1 --- Introduction --- p.16 / Chapter 3.2 --- Detection Approaches --- p.17 / Chapter 3.2.1 --- Execution Traces --- p.17 / Chapter 3.2.2 --- Partial Result Encapsulation --- p.18 / Chapter 3.2.3 --- State Appraisal --- p.20 / Chapter 3.3 --- Prevention Approaches --- p.20 / Chapter 3.3.1 --- Sliding Encryption --- p.20 / Chapter 3.3.2 --- Tamper-resistant Hardware --- p.21 / Chapter 3.3.3 --- Multi-agent Cooperation --- p.22 / Chapter 3.3.4 --- Code Obfuscation --- p.23 / Chapter 3.3.5 --- Intention Spreading and Shrinking --- p.26 / Chapter 3.3.6 --- Encrypted Function Evaluation --- p.26 / Chapter 3.3.7 --- Black Box Test Prevention --- p.27 / Chapter 3.4 --- Chapter Summary --- p.29 / Chapter 4 --- TAXONOMY OF ATTACKS --- p.30 / Chapter 4.1 --- Introduction --- p.30 / Chapter 4.2 --- Whatis attack? --- p.31 / Chapter 4.3 --- How can attacks be done? --- p.32 / Chapter 4.4 --- Taxonomy of Attacks --- p.33 / Chapter 4.4.1 --- Purposeful Attack --- p.33 / Chapter 4.4.2 --- Frivolous Attack --- p.36 / Chapter 4.4.3 --- The Full Taxonomy --- p.38 / Chapter 4.5 --- Using the Taxonomy --- p.38 / Chapter 4.5.1 --- Match to Existing Protection Schemes --- p.38 / Chapter 4.5.2 --- Insight to Potential Protection Schemes --- p.41 / Chapter 4.6 --- Chapter Summary --- p.42 / Chapter 5 --- PROTECTION FOR REACTIVE MOBILE AGENTS --- p.43 / Chapter 5.1 --- Introduction --- p.43 / Chapter 5.2 --- The Model --- p.45 / Chapter 5.2.1 --- The Non-reactive and Reactive Mobile Agent Model --- p.45 / Chapter 5.2.2 --- The Computation Flow --- p.47 / Chapter 5.2.3 --- An Example --- p.49 / Chapter 5.3 --- tools --- p.51 / Chapter 5.3.1 --- Encrypted Circuit Construction --- p.51 / Chapter 5.3.2 --- Circuit Cascading --- p.53 / Chapter 5.4 --- Proposed Protection Scheme --- p.54 / Chapter 5.4.1 --- Two-hop Protocol --- p.55 / Chapter 5.4.2 --- Multi-hop Protocol --- p.60 / Chapter 5.5 --- Security Analysis --- p.60 / Chapter 5.5.1 --- Security under Purposeful Attacks --- p.61 / Chapter 5.5.2 --- Security under Frivolous Attacks --- p.62 / Chapter 5.6 --- Improvements --- p.62 / Chapter 5.6.1 --- Basic Idea --- p.63 / Chapter 5.6.2 --- Input Retrieval Protocol --- p.63 / Chapter 5.6.3 --- Combating Frivolous Attacks --- p.65 / Chapter 5.7 --- Further Considerations --- p.66 / Chapter 5.8 --- Chapter Summary --- p.67 / Chapter 6 --- CONCLUSIONS --- p.68 / APPENDIX --- p.71 / BIBLIOGRAPHY --- p.72
Identifer | oai:union.ndltd.org:cuhk.edu.hk/oai:cuhk-dr:cuhk_323371 |
Date | January 2001 |
Contributors | Mo, Chun Man., Chinese University of Hong Kong Graduate School. Division of Information Engineering. |
Source Sets | The Chinese University of Hong Kong |
Language | English, Chinese |
Detected Language | English |
Type | Text, bibliography |
Format | print, ix, 80 leaves : ill. ; 30 cm. |
Rights | Use of this resource is governed by the terms and conditions of the Creative Commons “Attribution-NonCommercial-NoDerivatives 4.0 International” License (http://creativecommons.org/licenses/by-nc-nd/4.0/) |
Page generated in 0.0016 seconds