O'Reilly logo

Mobile Agents by Wilhelm R. Rossak, Peter Braun

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

424 Index
CPU reification, 211
cryptographic techniques, 188–192
cryptosystems, 162–163
asymmetric, 163
symmetric, 162
cut and paste attacks, 172, 190
D
D’Agents toolkit, 22
data, 37–38
adaptive transmission of, 125, 126
attacks, 171–173
capturing, 39
copying, 81
defined, 16, 37
dynamic, 190–192
encryption, 289, 290
filtering tasks, 72
fine-grained transmission, 101
marshaling, 111, 112
moving, 81
proxy, 81
read-only, protecting, 188–189
at specific agencies, 189–190
static, 81
transmission, 99
unmarshaling, 111, 112
use restriction, 37
user’s view, 80–81
data compression
break-even point, 304
effect, comparing, 302
improving effect of, 304
ping pong migration time, 303
remote agencies and, 304
transmission time and, 302–304
data item message, 252
data items, 222–223
access, 232, 266–267, 287
accessibility, 233
defined, 233
deleting, 233
encryption, 289–290
explicitly loading, 381
key, 223
loading, 235
loading, from home agency, 269–270
names, 240
problems, 222
protecting, for target agency, 289–290
reading, 288
read-only, 287–289
retrieving, 266
signing, 287
size, determining, 267
undefined, 233
uploading, 270–271
data request message, 252–253
data uploading experiment, 311–312
local network results, 312, 313
migration time, 311
migration time graphs, 312, 313
wide-area network results, 312, 313
data-shipping, 27, 31
Decode-Encode-Language (DEL), 18
decryption, 290
denial of service attacks, 169–170
dependency object, 136
deposited keys, 181
deserialization, 40
default, 202
object, 48
time, 296
design (migration), 74–98
classification approaches, 97–98
mobility model examples, 93–97
mobility models, 75–93
overview, 74–75
destination agencies, 50, 109, 157
agent transmission to, 271
defining addresses of, 386
SATP messages to, 276
See also agencies
detection, attack, 184–198
black-box attacks, 187–188
with cryptographic techniques, 188–192
with execution tracing, 192–197
itinerary manipulations, 197–198
with replication of agencies, 184–185
with replication of agents, 186–187
See also attacks; security
digests, 124, 165
algorithm, 124
defined, 124
message signing combined with, 165
See also hash values

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required