Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








7,714 Hits in 4.3 sec

A formally-verified migration protocol for mobile, multi-homed hosts

Matvey Arye, Erik Nordstrom, Robert Kiefer, Jennifer Rexford, Michael J. Freedman
2012 2012 20th IEEE International Conference on Network Protocols (ICNP)  
These mobile, multi-homed computers are a poor match with an Internet architecture that binds connections to fixed endpoints with topology-dependent addresses.  ...  We develop formal models to verify that ECCP works correctly in the presence of packet loss, out-of-order delivery, and frequent mobility, and to identify bugs and design limitations in earlier mobility  ...  ACKNOWLEDGMENTS The authors would like to thank David Shue and Prem Gopalan for their involvement with ECCP's protocol design, as well as Pamela Zave for her advice and comments on earlier versions of  ... 
doi:10.1109/icnp.2012.6459961 dblp:conf/icnp/AryeNKRF12 fatcat:czdcl6bh2rbfdmsiguvuqvhecy

A Provably-Correct Protocol for Seamless Communication with Mobile, Multi-Homed Hosts [article]

Matvey Arye, Erik Nordstrom, Robert Kiefer, Jennifer Rexford, Michael J. Freedman
2012 arXiv   pre-print
These mobile, multi-homed computers are a poor match with an Internet architecture that binds connections to fixed end-points with topology- dependent addresses.  ...  We use formal models to verify that ECCP works correctly in the presence of packet loss, out-of-order delivery, and frequent mobility, and to identify bugs and design limitations in earlier mobility protocols  ...  To our knowledge, this is the first end-to-end migration protocol to be formally verified.  ... 
arXiv:1203.4042v1 fatcat:cnwfixayhjdovbsecglyx4d4h4

Increasing network resilience through edge diversity in NEBULA

Matvey Arye, Robert Kiefer, Kyle Super, Erik Nordström, Michael J. Freedman, Eric Keller, Tom Rondeau, Jonathan M. Smith
2012 ACM SIGMOBILE Mobile Computing and Communications Review  
Serval provides a new layer 3.5 service abstraction that naturally supports mobility, multi-homing, and multi-path transport, while CRYSTAL is a new virtualization scheme for software radios that makes  ...  One of the attractions of cloud computing is its support for online services and data storage by thin clients such as mobile devices.  ...  To our knowledge, this is the first mobility protocol to be formally verified; a unique trait of our model is the inclusion of network packet loss, duplication, and reordering.  ... 
doi:10.1145/2412096.2412099 fatcat:amnmjl4jxrebtdxm4rnd3x47sy

Hybrid Approach for Secure Mobile Agent Computations [chapter]

J. Todd McDonald
2006 Lecture Notes in Computer Science  
We review and analyze methods proposed for securing agent operations in the face of passive and active adversaries by means of secure multi-party computations.  ...  Mobile agent applications are particularly vulnerable to malicious parties and thus require more stringent security measures-benefiting greatly from schemes where cryptographic protocols are utilized.  ...  Once agents obtain host input they then migrate to a centralized trusted execution site where the multi-round protocol is evaluated.  ... 
doi:10.1007/11801412_5 fatcat:carpt5cu6zd4hegny7zurmx6pi

Information Security Approach in Open Distributed Multi-Agent Virtual Learning Environment

Zahi A.M . Abu Sarhan, As'ad Mahmoud As'ad Alnaser
2014 International Journal of Computer Science & Information Technology (IJCSIT)  
, and proposed the migration behaviour simulation for their active software components (software agents).  ...  based on the implementation of two types of systems the first system with the centralized mobile agent information security management and the second system with decentralized mobile agents security management  ...  ACKNOWLEDGEMENT The authors are grateful to the Applied Science University, Amman, Jordan, for the full financial support granted to this research.  ... 
doi:10.5121/ijcsit.2014.6102 fatcat:wjuhtvw5cfhp3hh6z7zvehx46i

Towards Secure Mobile Multiagent Based Electronic Marketplace Systems

Klaus Fischer, Dieter Hutter, Matthias Klusch, Werner Stephan
2002 Electronical Notes in Theoretical Computer Science  
In this paper we aim at a generic methodology to validate, assess, and construct mobile multi-agent systems in the domain of virtual market places.  ...  It rests upon research carried out in the past to develop innovative engineering solutions for architectures based on the paradigm of mobile multi-agents.  ...  For example, various solutions have been proposed to define and verify secure key-exchange protocols or to translate a given trust model into a formal security policy.  ... 
doi:10.1016/s1571-0661(04)80337-2 fatcat:kny4vf4gqzbklblcn7pldy6bim

Secure Multi-Attribute One-to-Many Bilateral Negotiation Framework for E-Commerce

Raja Al-Jaljouli, Jemal Abawajy, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi
2018 IEEE Transactions on Services Computing  
I am most grateful to A/Prof. Jemal Abawajy, my academic supervisor for his close guidance, continuing support, and fruitful discussions throughout the research period.  ...  Acknowledgement Verily all praise is for Allah for His exposed and concealed bounties at all times. We praise Him, seek His help, and seek His forgiveness.  ...  Also, the security protocol is formally verified for the various security properties using Symbolic Trace Analyzer (STA).  ... 
doi:10.1109/tsc.2016.2560160 fatcat:m7mjxegydffbvm6synalhs5swm

Design, Validation, Simulation and Parametric Evaluation of a Novel Protocol for Locating Mobile Agents in Multiregion Environment

Rama Sushil, Kumkum Garg, Rama Bhargava
2008 Journal of Computer Science  
We proposed a location management technique applicable for multi-region environment in which mobile agent did not update its location at every migration.  ...  Location management is a necessity for locating mobile agents in a network of mobile agent hosts for controlling, monitoring and communication during processing and it still represents an open research  ...  The SPC protocol [12] is a combination of DL protocol and PP protocol, applied to a multi-region mobile agent computing environment.  ... 
doi:10.3844/jcssp.2008.256.271 fatcat:xoraqmew7fbndhfr4bupkbsymy

Fragmentation based encryption approach for self protected mobile agent

Shashank Srivastava, G.C. Nandi
2014 Journal of King Saud University: Computer and Information Sciences  
ª 2013 Production and hosting by Elsevier B.V. on behalf of King Saud University.  ...  The protocol is a combination of self decryption, co-operation and obfuscation technique.  ...  We can verify our security protocol formally as follows.  ... 
doi:10.1016/j.jksuci.2013.08.002 fatcat:hrk4eqsnbjbujh7xrkn3vng4bm

A generic mobile agent framework for ambient intelligence

Yung-Chuan Lee, Elham S. Khorasani, Shahram Rahimi, Bidyut Gupta
2008 Proceedings of the 2008 ACM symposium on Applied computing - SAC '08  
Finally, given that this approach is formulated based on multi-agent standard concepts, it can be easily implemented as add-on for existing software agent platforms to achieve rapid deployment.  ...  Compared to the existing state-of-the-art approaches, this framework creates a more decentralized and distributed AmI environment.  ...  host sent back by LB i for migrating agent.  ... 
doi:10.1145/1363686.1364137 dblp:conf/sac/LeeKRG08 fatcat:a6ixrxhsbfbmvgy32p3zrybnya

Exploration of Various Fault Tolerance Techniques

Payal Chhabra, Hardwari Lal
2017 International Journal of Computer Applications  
A mobile agent is composition of computer program that proceed autonomously for a user or application moving in the heterogeneous communication environment.  ...  To verify fault and failure free process of mobile agent based applications, consistency need to be addressed. Fault tolerance is important to the further expansion of mobile agent applications.  ...  Region-based Stage Construction Protocol RBSC protocol is used for fault tolerant execution of mobile agents in a multi-region mobile agent computing environment [2] .  ... 
doi:10.5120/ijca2017913436 fatcat:rqgp5mijdnbxzlvyzk2wecgzpm

A configurable mobile agent data protection protocol

Paolo Maggi, Riccardo Sisto
2003 Proceedings of the second international joint conference on Autonomous agents and multiagent systems - AAMAS '03  
This paper takes into account such criticisms and formally defines a new protocol that does not suffer from all the previous limitations.  ...  This paper addresses the problem of protecting the data carried by mobile agents from the possible attacks of malicious execution hosts.  ...  The first version of the multi-hop protocol [1] did not achieve data authenticity and for this reason had severe limitations.  ... 
doi:10.1145/860710.860712 fatcat:eda7w2qqjnfsna5tnv7sjg2uo4

A configurable mobile agent data protection protocol

Paolo Maggi, Riccardo Sisto
2003 Proceedings of the second international joint conference on Autonomous agents and multiagent systems - AAMAS '03  
This paper takes into account such criticisms and formally defines a new protocol that does not suffer from all the previous limitations.  ...  This paper addresses the problem of protecting the data carried by mobile agents from the possible attacks of malicious execution hosts.  ...  The first version of the multi-hop protocol [1] did not achieve data authenticity and for this reason had severe limitations.  ... 
doi:10.1145/860575.860712 dblp:conf/atal/MaggiS03 fatcat:4xjwwckrafbxjhotgarm2skiyy

On the design of a mobile agent environment for context-aware M-commerce

Xining Li, Jiazao Lin, Lian Li
2010 2010 3rd International Conference on Computer Science and Information Technology  
Due to technological advances of handheld computing and communication devices, Mobile commerce (Mcommerce) has emerged and attracted a growing number of research efforts.  ...  M-commerce not only extends Internet-based Electronic commerce (E-commerce), but also offers a unique business opportunity with its own features, such as ubiquity, accessibility, portability, etc.  ...  R. of China (90912003, 60773108 and 90812001) for supporting this research.  ... 
doi:10.1109/iccsit.2010.5563704 fatcat:jxmmhppnj5cfzdm56lqpnsr77q

Vulnerability Analysis of Mobile Agents Praxis in Mobile Ad-Hoc Networks

Bindiya Bhatia, M. K., Parul Tomar
2017 International Journal of Computer Applications  
In the emerging world, in a resource constrained network like mobile ad hoc network, the mobile agent is becoming a favorable option for creating applications like service discovery, network discovery,  ...  A mobile agent interacts with the node in a better way and provides enhanced options for the developers to design applications based on the disconnected network.  ...  The host generates mobile agents for the specific task. iii. Mobile agent migrates to the trusted host (S i ) with encrypted data.  ... 
doi:10.5120/ijca2017913633 fatcat:4w5bixkydjahtcxzlgel3ev7xy
« Previous Showing results 1 — 15 out of 7,714 results