首页> 外文期刊>Information systems security >Host-Based Security Challenges and Controls: A Survey of Contemporary Research
【24h】

Host-Based Security Challenges and Controls: A Survey of Contemporary Research

机译:Host-Based Security Challenges and Controls: A Survey of Contemporary Research

获取原文
获取原文并翻译 | 示例
           

摘要

Security in host-based computing continues to be an area of regular research. Problems in host-based security exist in three principal areas: application protection, host environment protection, and data protection. These three areas echo the security issues for mobile agents: protecting agents from hostile hosts, protecting hosts from agents, and protecting data in transit as identified in Vuong and Peng (2001). Mobile agents are specialized applications which travel between hosts. Mobility is achieved by passing data and execution parameters from one host to another. A parallel can be drawn between mobile agents and host-based applications considering both perform host-based computations. In this paper we regard the security challenges for mobile agents equivalent to those of applications installed on a host. Furthermore, we also consider a circular threat that exists between applications and the host environment.

著录项

获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号