280 research outputs found
Cryptography Based Hybrid Security Architecture for Mobile Multi Agents
Distributed Computing is the current area of research. Many researchers are working in area of Distributed Computing and trying to find a solution for the security and other issues. In Distributed Computing the mobile agents are the very important thing. When different mobile agents work in the same environment simultaneously it becomes a very important issue. Mobile agents have automatic, pro-active, and dynamic problem solving behaviors. However, scope of this paper is limited to analyze the existing security approaches for Mobile Multi Agent System. Security issues of mobile agent address the problem of securing and protecting agents from the attack of malicious hosts and other agents as well as securing the host from attack of malicious agents. This paper introduces a new approach of security for agent from other agents. Paper discusses Cryptography Based Hybrid Security Architecture with trust and reputation named CBHSA. It breaks the security of MA in two parts. The first level of security is work on the MA and second level of security is maintained on network. The model CBHSA, its different components and security of MA during movements around the network are discussed in this paper. This paper emphasis on the security of MA’s during migration within the network or outside the network
Cost-Effective Location Management for Mobile Agents on the Internet
Many mobile agent system-related services and applications require interacting with a mobile agent by passing messages. However, an agent’s mobility raises several challenges in delivering messages to a mobile agent accurately. Consisting of tracking and message delivery phases, most mobile agent location management schemes create or receive many update messages and interaction messages to ensure the effectiveness of the schemes. In addition to downgrading the overall performance of a mobile agent location management scheme, excessive transmission of messages increases the network load. The migration locality of a mobile agent and the interaction rate between mobile agents significantly affect the performance of a mobile agent location management scheme with respect to location management cost. This work presents a novel Dual Home based Scheme (DHS) that can lower the location management costs in terms of migration locality and interaction rate. While the DHS scheme uniquely adopts dual home location management architecture, a selective update strategy based on that architecture is also designed for cost-effective location management of mobile agents. Moreover, DHS is compared with available schemes based on formulations and simulation experiments from the perspective of location management costs. Simulation results demonstrate that the proposed DHS scheme performs satisfactorily in terms of migration locality and interaction rate
Verificare: a platform for composable verification with application to SDN-Enabled systems
Software-Defined Networking (SDN) has become increasing prevalent
in both the academic and industrial communities. A new class of system built on
SDNs, which we refer to as SDN-Enabled, provide programmatic interfaces between
the SDN controller and the larger distributed system. Existing tools for SDN
verification and analysis are insufficiently expressive to capture
this composition of a network and a larger distributed system. Generic
verification systems are an infeasible solution, due to their monolithic
approach to modeling and rapid state-space explosion.
In this thesis we present a new compositional approach to system modeling and
verification that is particularly appropriate for SDN-Enabled systems.
Compositional models may have sub-components (such as switches and
end-hosts) modified, added, or removed with only minimal, isolated changes.
Furthermore, invariants may be defined over the composed system that restrict
its behavior, allowing assumptions to be added or removed and for components to
be abstracted away into the service guarantee that they provide (such as
guaranteed packet arrival). Finally, compositional modeling can minimize the
size of the state space to be verified by taking advantage of known model
structure.
We also present the Verificare platform, a tool chain for building
compositional models in our modeling language and automatically compiling them
to multiple off-the-shelf verification tools. The compiler outputs a minimal,
calculus-oblivious formalism, which is accessed by plugins via a translation
API. This enables a wide variety of requirements to be
verified. As new tools become available, the translator can easily be extended
with plugins to support them
Town of Pittston Maine Ordinances
Ordinances cover: Addressing; Animal Control; Building Code; Business Development; Cable TV; Emergency Management; Exempt Excise Tax Military Personnel; Floodplain Management; General Assistance; Mailbox; Marijuana; Radioactive Waste; Recall Elected Officials; Road; Septage; Sexually Oriented Business; Shoreland Zoning; Solid Waste; Subdivision; Tax Acquired Property; Traffic Incident; Vehicle Weight on Posted Road; Wellhead Protection; Wireless Communicatio
Runtime Resolution of Feature Interactions in Evolving Telecommunications Systems
Feature interactions in telecommunications is an active research area. Many approaches to solve the so-called feature interaction problem have been proposed. However, all these approaches consider feature interaction as a somewhat isolated problem, in particular it is not seen in the context of evolving legacy systems and third party features in a deregulated market environment. An exception is the approach by Marples and Magill [MM98, Mar00], which presents an interaction detection mechanism and an essentially manual resolution approach. We develop an automatic resolution approach that can be integrated with Marples and Magill's detection mechanism. We distinguish two key concepts, namely solutions and resolutions. The former are essentially possible behaviours of the system, they are not qualified as desirable or undesirable, the latter are the desirable solutions. Our approach allows for automatic removal of undesired behaviour and selection of the "best" desired behaviour. The correctness, complexity and suitability of our approach are analysed. Two case studies support these more theoretical considerations. Our approach is transferable to other areas, such as quality of service management, and is not restricted to network architectures with a single point of control
Fraud detection in the banking sector : a multi-agent approach
Fraud is an increasing phenomenon as shown in many surveys carried out
by leading international consulting companies in the last years. Despite
the evolution of electronic payments and hacking techniques there is still a
strong human component in fraud schemes.
Conflict of interest in particular is the main contributing factor to the
success of internal fraud.
In such cases anomaly detection tools are not always the best instruments,
since the fraud schemes are based on faking documents in a context
dominated by lack of controls, and the perpetrators are those ones who
should control possible irregularities.
In the banking sector audit team experts can count only on their experience,
whistle blowing and the reports sent by their inspectors.
The Fraud Interactive Decision Expert System (FIDES), which is the
core of this research, is a multi-agent system built to support auditors in
evaluating suspicious behaviours and to speed up the evaluation process in
order to detect or prevent fraud schemes. The system combines Think-map,
Delphi method and Attack trees and it has been built around audit team
experts and their needs.
The output of FIDES is an attack tree, a tree-based diagram to ”systematically
categorize the different ways in which a system can be attacked”.
Once the attack tree is built, auditors can choose the path they perceive as
more suitable and decide whether or not to start the investigation.
The system is meant for use in the future to retrieve old cases in order
to match them with new ones and find similarities.
The retrieving features of the system will be useful to simplify the risk
management phase, since similar countermeasures adopted for past cases
might be useful for present ones.
Even though FIDES has been built with the banking sector in mind, it
can be applied in all those organisations, like insurance companies or public
organizations, where anti-fraud activity is based on a central anti-fraud unit
and a reporting system
Netzwerk-Management und Hochgeschwindigkeits- Kommunikation. Teil XIII
Der Interne Bericht enthaelt die Beitraege zum Seminar
"Netzwerk-Management und Hochgeschwindigkeits-Kommunikation",
das im Wintersemester 1995/96 zum 13. Mal stattgefunden hat.
Die Themenauswahl kann grob in folgende fuenf Bloecke
gegliedert werden:
1 - Der erste Block befasst sich mit der Problematik,
unterschiedliche Dienste und damit auch verschiedene
Anforderungen an die zu erbringende Dienstqualitaet in ein
Kommunikationssubsystem zu integrieren.
2 - Im zweiten Block wird das Management von FDDI-Netzen naeher
untersucht, wobei besonderes Augenmerk auf der Unterstuetzung
von isochronem Datenverkehr liegt.
3 - Der dritte Block befasst sich mit aktuellen Problemen aus
dem Bereich der Mobilkommunikation, insbesondere der Wegewahl
in Mobil-Netzen.
4 - Im Zentrum des vierten Blocks steht das Internet und dessen
Migration hin zu ATM. Dabei spielen vor allem
Gruppenkommunikation und Dienstelokalisierung eine grosse
Rolle.
5 - Der letzte Block schliesslich stellt die Verwaltung von
ATM-Netzen in den Mittelpunkt, indem verschiedene
Normungsvorschlaege zu diesem Thema ausgefuehrt werden
- …