TITLE

A Security Model for Mobile Agent in Grid Environment

PUB. DATE
May 2010
SOURCE
International Journal of Computer Applications;Mar2010, Vol. 2, p10
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
The article discusses the proposed communication model that integrates both Grid system and Mobile Agent to perform parallel computations with secured communication. It provides a detailed understanding on the application of matrix multiplication to test the functionality of the model. It also highlights the creation of data privacy to an agent so that the data possessed by the agents is secured at all times when it is executing at any of the untrusted hosts.
ACCESSION #
73177582

 

Related Articles

  • COOPERATIVE INTRUSION DETECTION SYSTEM FRAMEWORK USING MOBILE AGENTS FOR CLOUD COMPUTING. TOUMI, HICHAM; EDDAOUI, AHMED; TALEA, MOHAMED // Journal of Theoretical & Applied Information Technology;12/10/2014, Vol. 70 Issue 1, p76 

    Cloud computing improves collaboration, flexibility, scaling, and availability, and provides the potential for cost reduction through optimized and efficient computing. Cloud computing allows the use of a collection of services, applications, information, and infrastructure composed of group of...

  • A Secure Mobile Agents Platform. Ismail, Leila // Journal of Communications;Apr2008, Vol. 3 Issue 2, p1 

    Mobile Agents is a new paradigm for distributed computing where security is very essential to the acceptance of this paradigm in a large scale distributed environment. In this paper, we propose protection mechanisms for mobile agents. In these mechanisms, the authentication of mobile agents and...

  • Protecting mobile agents' data using trusted computing technology. He-qun Xian; Deng-guo Feng // Journal of Communication & Computer;Mar2007, Vol. 4 Issue 3, p44 

    Even with attractive computational advantages, mobile agent technology has not developed its full potential due to various security issues. This paper proposes a method called Private Key Consignment to solve the problem of how to protect the data carried by mobile agents. It exploits new...

  • Threats to Virtualization Less Theoretical, More Practical. MIMOSO, MICHAEL S. // Information Security;Sep2009, Vol. 11 Issue 8, p8 

    The article looks at the seriousness of security threats to virtualization. At the Black Hat 2009 USA conference, Immunity senior security researcher Kostya Kortchinsky discussed a tool called Cloudburst, which exploits a bug in the display functions of VMware Workstation 6.5.1 and earlier...

  • A Novel Design to Increase Trust in Cloud IaaS model. Seth, Jitendra Kumar; Chandra, Satish // International Journal of Computer Science Issues (IJCSI);Jul2013, Vol. 10 Issue 4, p329 

    In IaaS services of cloud the customers demand for hardware resources as a service like memory, processor cycles, disk storage even software. IaaS services of cloud rely heavily on virtualization. The service is provided by means of virtual machine. It is not easy task for cloud users to store...

  • A Framework of TPM, SVM and Boot Control for Securing Forensic Logs. Borhan, Nazanin; Mahmod, Ramlan; Dehghantanha, Ali // International Journal of Computer Applications;7/15/2012, Vol. 50, p15 

    Computer logs files contain the crucial information that is stored and can be an important forensics evidence of attacks and actions of a system. Cyber forensics can be one of the important solutions to systematically gather, process, interpret and utilize digital evidence and log of the...

  • Are You Safe in an IT Disaster?  // Software World;Nov2009, Vol. 40 Issue 6, p9 

    The article offers information on several information technology (IT) disaster recovery (DR) options that could be used as protection to critical IT systems of various organizations. It notes that backups provide solutions when data are accidentally deleted, lost or corrupted on the working...

  • 5 VIRTUALIZATION SECURITY DO's & DON'Ts. Ptacek, Thomas // Information Security;Jun2008, Vol. 11 Issue 5, p18 

    The article presents tips for avoiding virtualization pitfalls. Do not let the enterprise silo vitalization security. Do practice segmentation on the physical virtual machine servers. Do not ignore the risks of virtual machine migration. Do consider virtualization security systems carefully and...

  • Insurance Policy. Savage, Marcia // Information Security;Jun2008, Vol. 11 Issue 5, p22 

    The article focuses on the virtualization project of Ensurance. The company has deployed VMware in its pre-production environment and more recently virtualized its enterprise directory services. Ensurance, in implementing virtualization, adopted the same types of security measures it has in its...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics