Securing mobile agent in hostile environment.

by Mo Chun Man. === Thesis (M.Phil.)--Chinese University of Hong Kong, 2001. === Includes bibliographical references (leaves 72-80). === Abstracts in English and Chinese. === Chapter 1 --- INTRODUCTION --- p.1 === Chapter 1.1 --- The Mobile Agents --- p.2 === Chapter 1.2 --- The Mobile Agent Parad...

Full description

Bibliographic Details
Other Authors: Mo, Chun Man.
Format: Others
Language:English
Chinese
Published: 2001
Subjects:
Online Access:http://library.cuhk.edu.hk/record=b5890865
http://repository.lib.cuhk.edu.hk/en/item/cuhk-323371
Description
Summary:by Mo Chun Man. === Thesis (M.Phil.)--Chinese University of Hong Kong, 2001. === Includes bibliographical references (leaves 72-80). === Abstracts in English and Chinese. === Chapter 1 --- INTRODUCTION --- p.1 === Chapter 1.1 --- The Mobile Agents --- p.2 === Chapter 1.2 --- The Mobile Agent Paradigm --- p.4 === Chapter 1.2.1 --- Initiatives --- p.5 === Chapter 1.2.2 --- Applications --- p.7 === Chapter 1.3 --- The Mobile Agent S ystem --- p.8 === Chapter 1.4 --- Security in Mobile Agent System --- p.9 === Chapter 1.5 --- Thesis Organization --- p.11 === Chapter 2 --- BACKGROUND AND FOUNDATIONS --- p.12 === Chapter 2.1 --- Encryption/Decryption --- p.12 === Chapter 2.2 --- One-way Hash Function --- p.13 === Chapter 2.3 --- Message Authentication Code (MAC) --- p.13 === Chapter 2.4 --- Homomorphic Encryption Scheme --- p.14 === Chapter 2.5 --- One-Round Oblivious Transfer --- p.14 === Chapter 2.6 --- Polynomial-time Algorithms --- p.14 === Chapter 2.7 --- Circuit --- p.15 === Chapter 3 --- SURVEY OF PROTECTION SCHEMES ON MOBILE AGENTS --- p.16 === Chapter 3.1 --- Introduction --- p.16 === Chapter 3.2 --- Detection Approaches --- p.17 === Chapter 3.2.1 --- Execution Traces --- p.17 === Chapter 3.2.2 --- Partial Result Encapsulation --- p.18 === Chapter 3.2.3 --- State Appraisal --- p.20 === Chapter 3.3 --- Prevention Approaches --- p.20 === Chapter 3.3.1 --- Sliding Encryption --- p.20 === Chapter 3.3.2 --- Tamper-resistant Hardware --- p.21 === Chapter 3.3.3 --- Multi-agent Cooperation --- p.22 === Chapter 3.3.4 --- Code Obfuscation --- p.23 === Chapter 3.3.5 --- Intention Spreading and Shrinking --- p.26 === Chapter 3.3.6 --- Encrypted Function Evaluation --- p.26 === Chapter 3.3.7 --- Black Box Test Prevention --- p.27 === Chapter 3.4 --- Chapter Summary --- p.29 === Chapter 4 --- TAXONOMY OF ATTACKS --- p.30 === Chapter 4.1 --- Introduction --- p.30 === Chapter 4.2 --- Whatis attack? --- p.31 === Chapter 4.3 --- How can attacks be done? --- p.32 === Chapter 4.4 --- Taxonomy of Attacks --- p.33 === Chapter 4.4.1 --- Purposeful Attack --- p.33 === Chapter 4.4.2 --- Frivolous Attack --- p.36 === Chapter 4.4.3 --- The Full Taxonomy --- p.38 === Chapter 4.5 --- Using the Taxonomy --- p.38 === Chapter 4.5.1 --- Match to Existing Protection Schemes --- p.38 === Chapter 4.5.2 --- Insight to Potential Protection Schemes --- p.41 === Chapter 4.6 --- Chapter Summary --- p.42 === Chapter 5 --- PROTECTION FOR REACTIVE MOBILE AGENTS --- p.43 === Chapter 5.1 --- Introduction --- p.43 === Chapter 5.2 --- The Model --- p.45 === Chapter 5.2.1 --- The Non-reactive and Reactive Mobile Agent Model --- p.45 === Chapter 5.2.2 --- The Computation Flow --- p.47 === Chapter 5.2.3 --- An Example --- p.49 === Chapter 5.3 --- tools --- p.51 === Chapter 5.3.1 --- Encrypted Circuit Construction --- p.51 === Chapter 5.3.2 --- Circuit Cascading --- p.53 === Chapter 5.4 --- Proposed Protection Scheme --- p.54 === Chapter 5.4.1 --- Two-hop Protocol --- p.55 === Chapter 5.4.2 --- Multi-hop Protocol --- p.60 === Chapter 5.5 --- Security Analysis --- p.60 === Chapter 5.5.1 --- Security under Purposeful Attacks --- p.61 === Chapter 5.5.2 --- Security under Frivolous Attacks --- p.62 === Chapter 5.6 --- Improvements --- p.62 === Chapter 5.6.1 --- Basic Idea --- p.63 === Chapter 5.6.2 --- Input Retrieval Protocol --- p.63 === Chapter 5.6.3 --- Combating Frivolous Attacks --- p.65 === Chapter 5.7 --- Further Considerations --- p.66 === Chapter 5.8 --- Chapter Summary --- p.67 === Chapter 6 --- CONCLUSIONS --- p.68 === APPENDIX --- p.71 === BIBLIOGRAPHY --- p.72