Please use this identifier to cite or link to this item:
http://drsr.daiict.ac.in//handle/123456789/84
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Mathuria, Anish M. | |
dc.contributor.author | Panchal, Niravkumar K. | |
dc.date.accessioned | 2017-06-10T14:36:56Z | - |
dc.date.available | 2017-06-10T14:36:56Z | - |
dc.date.issued | 2005 | |
dc.identifier.citation | Panchal, Niravkumar K. (2005). Protecting mobile agents against malicious hosts using trusted computing. Dhirubhai Ambani Institute of Information and Communication Technology, ix, 50 p. (Acc.No: T00047) | |
dc.identifier.uri | http://drsr.daiict.ac.in/handle/123456789/84 | - |
dc.description.abstract | The concept of mobile agents was invented about a decade ago. Since then, plenty of innovative applications of mobile agents have been proposed. But it remains to be the fact that these applications have not been deployed to the desired extent. Security concerns associated with mobile agent systems are primary obstacles to their widespread adoption. Protecting mobile agent against malicious host is the unsolved aspect of these security concerns. Existing solutions to this problem are either not practical or not robust. We have provided a practical and robust solution to this problem using the concepts of Trusted Computing. We have designed security architecture for mobile agent systems. Our architecture uses the capabilities of the TCG (Trusted Computing Group) TPM (Trusted Platform Module) and TCG based integrity measurement architecture to provide the solution to the above mentioned problem. Since most of the mobile agent systems are Java based, we have provided an implementation of TCG aware Java Virtual Machine, which is one component of the overall architecture. | |
dc.publisher | Dhirubhai Ambani Institute of Information and Communication Technology | |
dc.subject | Computer security | |
dc.subject | Intelligent agents | |
dc.subject | Mobile agents | |
dc.subject | Mobile agents system | |
dc.subject | Trusted computing | |
dc.classification.ddc | 005.84 PAN | |
dc.title | Protecting mobile agents against malicious hosts using trusted computing | |
dc.type | Dissertation | |
dc.degree | M. Tech | |
dc.student.id | 200311023 | |
dc.accession.number | T00047 | |
Appears in Collections: | M Tech Dissertations |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
200311023.pdf Restricted Access | 248.33 kB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.