280 research outputs found

    Cryptography Based Hybrid Security Architecture for Mobile Multi Agents

    Get PDF
    Distributed Computing is the current area of research. Many researchers are working in area of Distributed Computing and trying to find a solution for the security and other issues. In Distributed Computing the mobile agents are the very important thing. When different mobile agents work in the same environment simultaneously it becomes a very important issue. Mobile agents have automatic, pro-active, and dynamic problem solving behaviors. However, scope of this paper is limited to analyze the existing security approaches for Mobile Multi Agent System. Security issues of mobile agent address the problem of securing and protecting agents from the attack of malicious hosts and other agents as well as securing the host from attack of malicious agents. This paper introduces a new approach of security for agent from other agents. Paper discusses Cryptography Based Hybrid Security Architecture with trust and reputation named CBHSA. It breaks the security of MA in two parts. The first level of security is work on the MA and second level of security is maintained on network. The model CBHSA, its different components and security of MA during movements around the network are discussed in this paper. This paper emphasis on the security of MA’s during migration within the network or outside the network

    Cost-Effective Location Management for Mobile Agents on the Internet

    Get PDF
    Many mobile agent system-related services and applications require interacting with a mobile agent by passing messages. However, an agent’s mobility raises several challenges in delivering messages to a mobile agent accurately. Consisting of tracking and message delivery phases, most mobile agent location management schemes create or receive many update messages and interaction messages to ensure the effectiveness of the schemes. In addition to downgrading the overall performance of a mobile agent location management scheme, excessive transmission of messages increases the network load. The migration locality of a mobile agent and the interaction rate between mobile agents significantly affect the performance of a mobile agent location management scheme with respect to location management cost. This work presents a novel Dual Home based Scheme (DHS) that can lower the location management costs in terms of migration locality and interaction rate. While the DHS scheme uniquely adopts dual home location management architecture, a selective update strategy based on that architecture is also designed for cost-effective location management of mobile agents. Moreover, DHS is compared with available schemes based on formulations and simulation experiments from the perspective of location management costs. Simulation results demonstrate that the proposed DHS scheme performs satisfactorily in terms of migration locality and interaction rate

    Town of Waldoboro 2017 Annual Report

    Get PDF

    Verificare: a platform for composable verification with application to SDN-Enabled systems

    Full text link
    Software-Defined Networking (SDN) has become increasing prevalent in both the academic and industrial communities. A new class of system built on SDNs, which we refer to as SDN-Enabled, provide programmatic interfaces between the SDN controller and the larger distributed system. Existing tools for SDN verification and analysis are insufficiently expressive to capture this composition of a network and a larger distributed system. Generic verification systems are an infeasible solution, due to their monolithic approach to modeling and rapid state-space explosion. In this thesis we present a new compositional approach to system modeling and verification that is particularly appropriate for SDN-Enabled systems. Compositional models may have sub-components (such as switches and end-hosts) modified, added, or removed with only minimal, isolated changes. Furthermore, invariants may be defined over the composed system that restrict its behavior, allowing assumptions to be added or removed and for components to be abstracted away into the service guarantee that they provide (such as guaranteed packet arrival). Finally, compositional modeling can minimize the size of the state space to be verified by taking advantage of known model structure. We also present the Verificare platform, a tool chain for building compositional models in our modeling language and automatically compiling them to multiple off-the-shelf verification tools. The compiler outputs a minimal, calculus-oblivious formalism, which is accessed by plugins via a translation API. This enables a wide variety of requirements to be verified. As new tools become available, the translator can easily be extended with plugins to support them

    Town of Pittston Maine Ordinances

    Get PDF
    Ordinances cover: Addressing; Animal Control; Building Code; Business Development; Cable TV; Emergency Management; Exempt Excise Tax Military Personnel; Floodplain Management; General Assistance; Mailbox; Marijuana; Radioactive Waste; Recall Elected Officials; Road; Septage; Sexually Oriented Business; Shoreland Zoning; Solid Waste; Subdivision; Tax Acquired Property; Traffic Incident; Vehicle Weight on Posted Road; Wellhead Protection; Wireless Communicatio

    Runtime Resolution of Feature Interactions in Evolving Telecommunications Systems

    Get PDF
    Feature interactions in telecommunications is an active research area. Many approaches to solve the so-called feature interaction problem have been proposed. However, all these approaches consider feature interaction as a somewhat isolated problem, in particular it is not seen in the context of evolving legacy systems and third party features in a deregulated market environment. An exception is the approach by Marples and Magill [MM98, Mar00], which presents an interaction detection mechanism and an essentially manual resolution approach. We develop an automatic resolution approach that can be integrated with Marples and Magill's detection mechanism. We distinguish two key concepts, namely solutions and resolutions. The former are essentially possible behaviours of the system, they are not qualified as desirable or undesirable, the latter are the desirable solutions. Our approach allows for automatic removal of undesired behaviour and selection of the "best" desired behaviour. The correctness, complexity and suitability of our approach are analysed. Two case studies support these more theoretical considerations. Our approach is transferable to other areas, such as quality of service management, and is not restricted to network architectures with a single point of control

    Fraud detection in the banking sector : a multi-agent approach

    Get PDF
    Fraud is an increasing phenomenon as shown in many surveys carried out by leading international consulting companies in the last years. Despite the evolution of electronic payments and hacking techniques there is still a strong human component in fraud schemes. Conflict of interest in particular is the main contributing factor to the success of internal fraud. In such cases anomaly detection tools are not always the best instruments, since the fraud schemes are based on faking documents in a context dominated by lack of controls, and the perpetrators are those ones who should control possible irregularities. In the banking sector audit team experts can count only on their experience, whistle blowing and the reports sent by their inspectors. The Fraud Interactive Decision Expert System (FIDES), which is the core of this research, is a multi-agent system built to support auditors in evaluating suspicious behaviours and to speed up the evaluation process in order to detect or prevent fraud schemes. The system combines Think-map, Delphi method and Attack trees and it has been built around audit team experts and their needs. The output of FIDES is an attack tree, a tree-based diagram to ”systematically categorize the different ways in which a system can be attacked”. Once the attack tree is built, auditors can choose the path they perceive as more suitable and decide whether or not to start the investigation. The system is meant for use in the future to retrieve old cases in order to match them with new ones and find similarities. The retrieving features of the system will be useful to simplify the risk management phase, since similar countermeasures adopted for past cases might be useful for present ones. Even though FIDES has been built with the banking sector in mind, it can be applied in all those organisations, like insurance companies or public organizations, where anti-fraud activity is based on a central anti-fraud unit and a reporting system

    Netzwerk-Management und Hochgeschwindigkeits- Kommunikation. Teil XIII

    Get PDF
    Der Interne Bericht enthaelt die Beitraege zum Seminar "Netzwerk-Management und Hochgeschwindigkeits-Kommunikation", das im Wintersemester 1995/96 zum 13. Mal stattgefunden hat. Die Themenauswahl kann grob in folgende fuenf Bloecke gegliedert werden: 1 - Der erste Block befasst sich mit der Problematik, unterschiedliche Dienste und damit auch verschiedene Anforderungen an die zu erbringende Dienstqualitaet in ein Kommunikationssubsystem zu integrieren. 2 - Im zweiten Block wird das Management von FDDI-Netzen naeher untersucht, wobei besonderes Augenmerk auf der Unterstuetzung von isochronem Datenverkehr liegt. 3 - Der dritte Block befasst sich mit aktuellen Problemen aus dem Bereich der Mobilkommunikation, insbesondere der Wegewahl in Mobil-Netzen. 4 - Im Zentrum des vierten Blocks steht das Internet und dessen Migration hin zu ATM. Dabei spielen vor allem Gruppenkommunikation und Dienstelokalisierung eine grosse Rolle. 5 - Der letzte Block schliesslich stellt die Verwaltung von ATM-Netzen in den Mittelpunkt, indem verschiedene Normungsvorschlaege zu diesem Thema ausgefuehrt werden

    Directory-Enabled Networking Design Reference

    Full text link
    • …
    corecore