Network security: private communication in a public world
Network security: private communication in a public world
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Network Security Essentials: Applications and Standards
Network Security Essentials: Applications and Standards
IEEE Internet Computing
Security and Communication in Mobile Object Systems
MOS '96 Selected Presentations and Invited Papers Second International Workshop on Mobile Object Systems - Towards the Programmable Internet
Agent Tcl: a flexible and secure mobile-agent system
TCLTK'96 Proceedings of the 4th conference on USENIX Tcl/Tk Workshop, 1996 - Volume 4
Hi-index | 0.00 |
Paradoxically, every thing that makes computer networks so useful and popular, their ability to enable communication between an ever-increasing numbers of people on a global scale, is also the thing that renders them vulnerable to abuse. For a software to succeed in today's ever-increasing market, it not only has to function correctly but it also has to be fast, secure, fault tolerant, distributed, easy-to-use, and much more. Customers require new solutions to secure networks that face increasing security threats, as well as to address evolving network environments and new business requirements. Mobile agents are an effective choice for many applications due to several reasons, including improvements in latency and bandwidth of client-server applications, reducing network load and vulnerabilities assessment. [1]. This paper describes the approach of distributed agent architecture for monitoring, intrusion detection and response in networked computers.