{"title":"使用扩展的SENSE模式对抗代理安全漏洞","authors":"J. Page, A. Zaslavsky, M. Indrawan","doi":"10.1109/IAT.2004.1342942","DOIUrl":null,"url":null,"abstract":"This work discusses issues involving an intelligent self-reliant mechanism for mobile agents to detect code-tampering attacks made by malicious entities. While describing the security schema, the paper details some scenarios that make the agent vulnerable to malicious attacks. The paper also proposes an extension to the original schema enabling it to cover another security vulnerability in agent operation.","PeriodicalId":281008,"journal":{"name":"Proceedings. IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2004. (IAT 2004).","volume":"449 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Countering agent security vulnerabilities using an extended SENSE schema\",\"authors\":\"J. Page, A. Zaslavsky, M. Indrawan\",\"doi\":\"10.1109/IAT.2004.1342942\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This work discusses issues involving an intelligent self-reliant mechanism for mobile agents to detect code-tampering attacks made by malicious entities. While describing the security schema, the paper details some scenarios that make the agent vulnerable to malicious attacks. The paper also proposes an extension to the original schema enabling it to cover another security vulnerability in agent operation.\",\"PeriodicalId\":281008,\"journal\":{\"name\":\"Proceedings. IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2004. (IAT 2004).\",\"volume\":\"449 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2004-09-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings. IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2004. (IAT 2004).\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IAT.2004.1342942\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings. IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2004. (IAT 2004).","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IAT.2004.1342942","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Countering agent security vulnerabilities using an extended SENSE schema
This work discusses issues involving an intelligent self-reliant mechanism for mobile agents to detect code-tampering attacks made by malicious entities. While describing the security schema, the paper details some scenarios that make the agent vulnerable to malicious attacks. The paper also proposes an extension to the original schema enabling it to cover another security vulnerability in agent operation.