Optimal assignment of mobile agents for software authorization and protection
The practicality of mobile agents hinges on realistic security techniques. Mobile agents are able to reside on heterogeneous platforms, and can be deployed rapidly over the network. They can respond to each other and their environment. These abilities exposed flaws in current security technology.
Saved in:
Main Author: | Yap, St Dean. |
---|---|
Other Authors: | Low, Chor Ping |
Format: | Theses and Dissertations |
Published: |
2008
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/3863 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Similar Items
-
Location based software distribution through mobile agents
by: Sim, Hui Sze.
Published: (2011) -
Optimization of mobile agent procurement performance in an uncertain environment
by: Sheng, Jin.
Published: (2008) -
Software to facilitate the design of lightning protection system
by: Lim, Chye Hock
Published: (2009) -
Inference of software agent a web-based fcm (fuzzy cognitive map) and dcn (dynamic cognitive network) software agent
by: Pua, Eng Heng.
Published: (2008) -
Software agent for economic sustainability assessment of recycling technology
by: Sheng, Yunzhou.
Published: (2011)