Optimal assignment of mobile agents for software authorization and protection

The practicality of mobile agents hinges on realistic security techniques. Mobile agents are able to reside on heterogeneous platforms, and can be deployed rapidly over the network. They can respond to each other and their environment. These abilities exposed flaws in current security technology.

Saved in:
Bibliographic Details
Main Author: Yap, St Dean.
Other Authors: Low, Chor Ping
Format: Theses and Dissertations
Published: 2008
Subjects:
Online Access:http://hdl.handle.net/10356/3863
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
id sg-ntu-dr.10356-3863
record_format dspace
spelling sg-ntu-dr.10356-38632023-07-04T15:42:36Z Optimal assignment of mobile agents for software authorization and protection Yap, St Dean. Low, Chor Ping School of Electrical and Electronic Engineering DRNTU::Engineering::Electrical and electronic engineering::Computer hardware, software and systems The practicality of mobile agents hinges on realistic security techniques. Mobile agents are able to reside on heterogeneous platforms, and can be deployed rapidly over the network. They can respond to each other and their environment. These abilities exposed flaws in current security technology. Master of Science 2008-09-17T09:39:17Z 2008-09-17T09:39:17Z 2000 2000 Thesis http://hdl.handle.net/10356/3863 Nanyang Technological University application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
topic DRNTU::Engineering::Electrical and electronic engineering::Computer hardware, software and systems
spellingShingle DRNTU::Engineering::Electrical and electronic engineering::Computer hardware, software and systems
Yap, St Dean.
Optimal assignment of mobile agents for software authorization and protection
description The practicality of mobile agents hinges on realistic security techniques. Mobile agents are able to reside on heterogeneous platforms, and can be deployed rapidly over the network. They can respond to each other and their environment. These abilities exposed flaws in current security technology.
author2 Low, Chor Ping
author_facet Low, Chor Ping
Yap, St Dean.
format Theses and Dissertations
author Yap, St Dean.
author_sort Yap, St Dean.
title Optimal assignment of mobile agents for software authorization and protection
title_short Optimal assignment of mobile agents for software authorization and protection
title_full Optimal assignment of mobile agents for software authorization and protection
title_fullStr Optimal assignment of mobile agents for software authorization and protection
title_full_unstemmed Optimal assignment of mobile agents for software authorization and protection
title_sort optimal assignment of mobile agents for software authorization and protection
publishDate 2008
url http://hdl.handle.net/10356/3863
_version_ 1772828024325013504