Optimal assignment of mobile agents for software authorization and protection
The practicality of mobile agents hinges on realistic security techniques. Mobile agents are able to reside on heterogeneous platforms, and can be deployed rapidly over the network. They can respond to each other and their environment. These abilities exposed flaws in current security technology.
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Theses and Dissertations |
Published: |
2008
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/3863 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
id |
sg-ntu-dr.10356-3863 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-38632023-07-04T15:42:36Z Optimal assignment of mobile agents for software authorization and protection Yap, St Dean. Low, Chor Ping School of Electrical and Electronic Engineering DRNTU::Engineering::Electrical and electronic engineering::Computer hardware, software and systems The practicality of mobile agents hinges on realistic security techniques. Mobile agents are able to reside on heterogeneous platforms, and can be deployed rapidly over the network. They can respond to each other and their environment. These abilities exposed flaws in current security technology. Master of Science 2008-09-17T09:39:17Z 2008-09-17T09:39:17Z 2000 2000 Thesis http://hdl.handle.net/10356/3863 Nanyang Technological University application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
topic |
DRNTU::Engineering::Electrical and electronic engineering::Computer hardware, software and systems |
spellingShingle |
DRNTU::Engineering::Electrical and electronic engineering::Computer hardware, software and systems Yap, St Dean. Optimal assignment of mobile agents for software authorization and protection |
description |
The practicality of mobile agents hinges on realistic security techniques. Mobile agents are able to reside on heterogeneous platforms, and can be deployed rapidly over the network. They can respond to each other and their environment. These abilities exposed flaws in current security technology. |
author2 |
Low, Chor Ping |
author_facet |
Low, Chor Ping Yap, St Dean. |
format |
Theses and Dissertations |
author |
Yap, St Dean. |
author_sort |
Yap, St Dean. |
title |
Optimal assignment of mobile agents for software authorization and protection |
title_short |
Optimal assignment of mobile agents for software authorization and protection |
title_full |
Optimal assignment of mobile agents for software authorization and protection |
title_fullStr |
Optimal assignment of mobile agents for software authorization and protection |
title_full_unstemmed |
Optimal assignment of mobile agents for software authorization and protection |
title_sort |
optimal assignment of mobile agents for software authorization and protection |
publishDate |
2008 |
url |
http://hdl.handle.net/10356/3863 |
_version_ |
1772828024325013504 |