ارسل ملاحظاتك

ارسل ملاحظاتك لنا







Fragmentation Based Encryption Approach For Self Protected Mobile Agent

المصدر: مجلة جامعة الملك سعود - علوم الحاسب والمعلومات
الناشر: جامعة الملك سعود
المؤلف الرئيسي: Srivastava, Shashank (Author)
مؤلفين آخرين: Nandi, G.C. (Co-Author)
المجلد/العدد: مج26, ع1
محكمة: نعم
الدولة: السعودية
التاريخ الميلادي: 2014
الصفحات: 131 - 142
DOI: 10.33948/0584-026-001-013
ISSN: 1319-1578
رقم MD: 973050
نوع المحتوى: بحوث ومقالات
اللغة: الإنجليزية
قواعد المعلومات: science
مواضيع:
كلمات المؤلف المفتاحية:
AES | Fragmentation Based Encryption | Mobile Code | Mobile Agent | Self Protected Mobile Agent | Formal Modelling
رابط المحتوى:
صورة الغلاف QR قانون
حفظ في:
LEADER 02456nam a22002417a 4500
001 1715956
024 |3 10.33948/0584-026-001-013 
041 |a eng 
044 |b السعودية 
100 |9 524617  |a Srivastava, Shashank  |e Author 
245 |a Fragmentation Based Encryption Approach For Self Protected Mobile Agent 
260 |b جامعة الملك سعود  |c 2014 
300 |a 131 - 142 
336 |a بحوث ومقالات  |b Article 
520 |b Distributed applications provide challenging environment in today’s advancing technological world. To enhance the aspects of better performance and efficiency in real scenario mobile agent’s concept has been brought forward. As every technological movement is aligned with its repercussions, the mobile agent technology also has its inherent security loopholes. Usage of agent technology poses various security threats over networked infrastructure. Moreover numerous researches have already been proposed to take the edge off inherent security risk faced by mobile agent, but all these approaches did not resolve the malicious execution environment problem in permissible and effectual conduct. Gaining the understanding of mobile agent architecture and the security concerns, in this paper, we proposed a security protocol which addresses security with mitigated computational cost. The protocol is a combination of self-decryption, co-operation and obfuscation technique. To circumvent the risk of malicious code execution in attacking environment, we have proposed fragmentation based encryption technique. Our encryption technique suits the general mobile agent size and provides hard and thorny obfuscation increasing attacker’s challenge on the same plane providing better performance with respect to computational cost as compared to existing AES encryption. 
653 |a علوم الحاسوب  |a أمن المعلومات  |a التشفير 
692 |b AES  |b Fragmentation Based Encryption  |b Mobile Code  |b Mobile Agent  |b Self Protected Mobile Agent  |b Formal Modelling 
700 |9 524618  |a Nandi, G.C.  |e Co-Author 
773 |c 013  |e Journal of King Saud University (Computer and Information Sciences)  |f Maǧalaẗ ǧamʼaẗ al-malīk Saud : ùlm al-ḥasib wa al-maʼlumat  |l 001  |m مج26, ع1  |o 0584  |s مجلة جامعة الملك سعود - علوم الحاسب والمعلومات  |v 026  |x 1319-1578 
856 |u 0584-026-001-013.pdf 
930 |d y  |p y 
995 |a science 
999 |c 973050  |d 973050 

عناصر مشابهة