Cover image for Security Modeling and Analysis of Mobile Agent Systems : Security Modeling and Analysis of Mobile Agent Systems.
Security Modeling and Analysis of Mobile Agent Systems : Security Modeling and Analysis of Mobile Agent Systems.
Title:
Security Modeling and Analysis of Mobile Agent Systems : Security Modeling and Analysis of Mobile Agent Systems.
Author:
Ma, Lu.
ISBN:
9781860949050
Personal Author:
Physical Description:
1 online resource (214 pages)
Series:
Series in Electrical and Computer Engineering ; v.5

Series in Electrical and Computer Engineering
Contents:
Contents -- Preface -- 1 Introduction -- 1.1 Background -- 2 Mobile Agent System -- 2.1 Components of a Mobile Agent System -- 2.2 Characteristics and Advantages of a Mobile Agent System -- 3 Attacks and Countermeasures of Software System Security -- 3.1 General Security Objectives -- 3.2 Types of Attacks -- 3.2.1 Attacks against availability -- 3.2.2 Attacks against confidentiality -- 3.2.3 Attacks against integrity -- 3.2.4 Attacks against miscellaneous security objectives -- 3.3 Countermeasures of Attacks -- 3.3.1 Authentication -- 3.3.2 Access control -- 3.3.3 Audit and intrusion detection -- 3.3.4 Cryptography -- 3.3.5 Firewall -- 3.3.6 Anti-virus software -- 4 Security Issues in a Mobile Agent System -- 4.1 Security Issues in a Mobile Agent System -- 4.1.1 Possible attacks to a mobile agent system -- 4.1.1.1 Possible attacks to a mobile agent -- 4.1.1.2 Possible attacks to a mobile agent platform -- 4.1.2 Security requirements for a secure mobile agent system -- 4.2 Related Works -- 4.2.1 Existing mobile agent systems -- 4.2.2 Security research -- 4.2.2.1 Security measures for a mobile agent platform -- 4.2.2.2 Security measures for a mobile agent -- 4.2.3 Mobility modeling -- 4.2.4 Conclusions -- 5 A New Formal Model - Extended Elementary Object System (EEOS) -- 5.1 Object-Oriented Technology and Petri Nets -- 5.2 Elementary Object System (EOS) -- 5.3 Extended Elementary Object System (EEOS) -- 5.3.1 Requirements of a formal method for mobile agent system modeling -- 5.3.2 Extensions to Elementary Object System -- 5.3.2.1 Multiple system nets -- 5.3.2.2 Multiple layers -- 5.3.2.3 Token pool -- 5.3.2.4 Internal places external places and internal transitions external transitions -- 5.3.2.5 Two new arcs -- 5.3.2.6 Extended interaction relation.

5.3.3 Formal specification of Extended Elementary Object System -- 6 A Formal Framework of a Generic Secure Mobile Agent System Based on EEOS -- 6.1 Structure of a Mobile Agent System -- 6.1.1 Mobile agent platform -- 6.1.1.1 Functionalities and components of a mobile agent platform -- 6.1.1.2 EEOS model of a mobile agent platform -- 6.1.2 Trust server -- 6.1.3 Mobile agent -- 6.1.3.1 Functionalities and components of a mobile agent -- 6.1.3.2 EEOS model -- 6.2 Communication in a Mobile Agent System -- 6.2.1 Dynamic connection -- 6.2.2 Communications for a mobile agent platform and a mobile agent -- 6.2.2.1 Communication contents -- 6.2.2.2 Synchronous and asynchronous communications -- 6.3 Mobility in a Mobile Agent System -- 6.3.1 Strong mobility -- 6.3.2 Weak mobility -- 6.3.3 Discussion about weak mobility and strong mobility -- 6.4 Security in a Mobile Agent System -- 6.4.1 Secure mobile agent transfer -- 6.4.1.1 Formalization of the secure mobile agent transfer -- 6.4.2 Mutual authentication between a mobile agent and a mobile agent platform -- 6.4.3 Authorization for a mobile agent from a mobile agent platform -- 6.4.3.1 Authorization expression method -- 6.4.3.2 Authorization policy -- 6.4.3.3 Authorization maintenance -- 6.4.4 Data security and action security -- 6.4.4.1 Data security -- 6.4.4.2 Action security -- 7 Translating the EEOS Model to Colored Petri Net Model -- 7.1 Object Net Tokens and Special Tokens -- 7.1.1 Object net tokens -- 7.1.2 Special tokens -- 7.2 Dynamic Connection -- 7.3 New Constructs - Two New Arcs and Extended Interaction Relation -- 7.3.1 Two new arcs -- 7.3.2 Extended interaction relation -- 7.4 Complicated Communication.

8 Simulation and Analysis of the Extended Elementary Object System Model of a Secure Mobile Agent System -- 8.1 Reachability -- 8.2 Boundedness -- 8.3 Liveness -- 8.4 Concurrency -- 8.5 Security -- 9 A Case Study in Electronic Commerce -- 9.1 Case Scenario -- 9.2 EEOS Model -- 9.3 Synchronous Firing Mechanism in the Case Study -- 9.4 Design/CPN Model and Experiment Results -- 10 A Case Study in E-Auction System -- 10.1 Case Scenario -- 10.1.1 ABEAS - agent based e-auctioning system -- 10.1.1.1 The agents in ABEAS -- 10.1.1.2 The agent platform in ABEAS -- 10.1.1.3 Security issues in the ABEAS -- 10.1.2 Modeling requirements of ABEAS -- 10.2 EEOS Model -- 10.2.1 The e-broker agent -- 10.2.2 The modified trust server -- 11 Conclusion -- Bibliography -- Index.
Abstract:
A mobile agent system could be attacked by malicious agents, platforms and third parties. Mobile agents simply offer greater opportunities for abuse and misuse, which broadens the scale of threats significantly. In addition, since mobile agents have some unique characteristics such as their mobility, security problems have become more complicated in these systems. These security problems have become a bottleneck in the development and maintenance of mobile agent systems, especially in security sensitive applications such as electronic commerce. This book introduces the concept and structure of mobile agent systems and discusses various attacks and countermeasures. The emphasis is on the formal modeling and analysis of secure mobile agent systems and their applications. Sample Chapter(s). Chapter 1: Introduction (97 KB). Contents: Mobile Agent System; Attacks and Countermeasures of Software System Security; Security Issues in a Mobile Agent System; A New Formal Model - Extended Elementary Object System (EEOS); A Formal Framework of a Generic Secure Mobile Agent System Based on EEOS; Translating the EEOS Model to Colored Petri Net Model; Simulation and Analysis of the Extended Elementary Object System Model of a Secure Mobile Agent System; A Case Study in Electronic Commerce; A Case Study in E-Auction System. Readership: Computer scientists, researchers, software engineers, programmers and graduate students in software engineering, networking and automated systems.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Added Author:
Electronic Access:
Click to View
Holds: Copies: