Please use this identifier to cite or link to this item: http://drsr.daiict.ac.in//handle/123456789/84
Full metadata record
DC FieldValueLanguage
dc.contributor.advisorMathuria, Anish M.
dc.contributor.authorPanchal, Niravkumar K.
dc.date.accessioned2017-06-10T14:36:56Z-
dc.date.available2017-06-10T14:36:56Z-
dc.date.issued2005
dc.identifier.citationPanchal, Niravkumar K. (2005). Protecting mobile agents against malicious hosts using trusted computing. Dhirubhai Ambani Institute of Information and Communication Technology, ix, 50 p. (Acc.No: T00047)
dc.identifier.urihttp://drsr.daiict.ac.in/handle/123456789/84-
dc.description.abstractThe concept of mobile agents was invented about a decade ago. Since then, plenty of innovative applications of mobile agents have been proposed. But it remains to be the fact that these applications have not been deployed to the desired extent. Security concerns associated with mobile agent systems are primary obstacles to their widespread adoption. Protecting mobile agent against malicious host is the unsolved aspect of these security concerns. Existing solutions to this problem are either not practical or not robust. We have provided a practical and robust solution to this problem using the concepts of Trusted Computing. We have designed security architecture for mobile agent systems. Our architecture uses the capabilities of the TCG (Trusted Computing Group) TPM (Trusted Platform Module) and TCG based integrity measurement architecture to provide the solution to the above mentioned problem. Since most of the mobile agent systems are Java based, we have provided an implementation of TCG aware Java Virtual Machine, which is one component of the overall architecture.
dc.publisherDhirubhai Ambani Institute of Information and Communication Technology
dc.subjectComputer security
dc.subjectIntelligent agents
dc.subjectMobile agents
dc.subjectMobile agents system
dc.subjectTrusted computing
dc.classification.ddc005.84 PAN
dc.titleProtecting mobile agents against malicious hosts using trusted computing
dc.typeDissertation
dc.degreeM. Tech
dc.student.id200311023
dc.accession.numberT00047
Appears in Collections:M Tech Dissertations

Files in This Item:
File Description SizeFormat 
200311023.pdf
  Restricted Access
248.33 kBAdobe PDFThumbnail
View/Open Request a copy


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.