Narrow your search

Library

KBR (3)

Hogeschool Gent (1)

KU Leuven (1)

FOD/SPF PO (1)

UAntwerpen (1)

UCLouvain (1)

UGent (1)

ULB (1)

ULiège (1)


Resource type

book (3)


Language

Dutch (1)

English (1)

French (1)


Year
From To Submit

1998 (3)

Listing 1 - 3 of 3
Sort by

Book
Ms Word 97 : met praktische voorbeelden en oefeningen
Authors: --- ---
ISBN: 9034110621 Year: 1998 Publisher: Antwerpen MIM/Standaard

Loading...
Export citation

Choose an application

Bookmark

Abstract

Mobile agents and security
Author:
ISSN: 03029743 ISBN: 3540647929 9783540647928 3540686711 Year: 1998 Volume: 1419 Publisher: New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

New paradigms can popularize old technologies. A new standalone" paradigm, the electronic desktop, popularized the personal computer. A new connected" paradigm, the web browser, popularized the Internet. Another new paradigm, the mobile agent, may further popularize the Internet by giving people greater access to it with less eort. MobileAgentParadigm The mobile agent paradigm integrates a network of computers in a novel way designed to simplify the development of network applications. To an application developer the computers appear to form an electronic world of places occupied by agents. Each agent or place in the electronic world has the authority of an individual or an organization in the physical world. The authority can be established, for example, cryptographically. A mobile agent can travel from one place to another subject to the des- nation place’s approval. The source and destination places can be in the same computer or in di erent computers. In either case,the agentinitiates the trip by executing a go" instruction which takes as an argument the name or address of the destination place. The next instruction in the agent’s program is executed in the destination place, rather than in the source place. Thus, in a sense, the mobile agent paradigm reduces networking to a program instruction. A mobile agent can interact programmatically with the places it visits and, if the other agents approve, with the other agents it encounters in those places.

Keywords

Computer security --- Computerbeveiliging --- Computers--Beveiliging --- Informatique--Sécurité --- Mobile agents (Computer software) --- Mobile agents (Computersoftware) --- Mobile agents (Logiciel d'ordinateur) --- Sécurité informatique --- Computer security. --- 681.3 *C2 --- 681.3*C24 --- Computer communication networks: data communications; OSI; security and protection --- Distributed systems: distributed databases; distributed applications; networkoperating systems --- Computer Science --- Engineering & Applied Sciences --- Mobile agents (Computer software). --- 681.3*C24 Distributed systems: distributed databases; distributed applications; networkoperating systems --- 681.3 *C2 Computer communication networks: data communications; OSI; security and protection --- Sécurité informatique --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Agents, Mobile (Computer software) --- Mobile Internet agents (Computer software) --- Security measures --- Protection of computer systems --- Protection --- Computer science. --- Computer communication systems. --- Operating systems (Computers). --- Data encryption (Computer science). --- Artificial intelligence. --- Management information systems. --- Computer Science. --- Data Encryption. --- Operating Systems. --- Computer Communication Networks. --- Artificial Intelligence (incl. Robotics). --- Management of Computing and Information Systems. --- Intelligent agents (Computer software) --- Data protection --- Security systems --- Hacking --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer operating systems --- Disk operating systems --- Systems software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Communication systems --- Operating systems --- Distributed processing --- Information Systems. --- Cryptology. --- Artificial Intelligence.

Listing 1 - 3 of 3
Sort by