Please use this identifier to cite or link to this item: http://dspace.unimap.edu.my:80/xmlui/handle/123456789/6347
Full metadata record
DC FieldValueLanguage
dc.contributor.authorGhossoon, Mohammed Waleed Al-Saadoon-
dc.date.accessioned2009-07-07T08:36:48Z-
dc.date.available2009-07-07T08:36:48Z-
dc.date.issued2009-
dc.identifier.citationJournal of Computer Science, vol.5 (4), 2009, pages 270-274.en_US
dc.identifier.urihttp://dspace.unimap.edu.my/123456789/6347-
dc.identifier.urihttp://www.scipub.org/scipub/detail_issue.php?V_No=45&j_id=jcs-
dc.descriptionLink to publisher's homepage at http://scipub.org/scipub/index.phpen_US
dc.description.abstractProblem statement: Wireless application protocol is a protocol that makes it possible to surf the Internet from a cellular phone or other handheld wireless. Many of us that surf the Internet from home with a 56 kbps modem think that it is slow and a cell phone only uses 9.6 kbps so WAP has to take the lesser bandwidth into consideration. For this reason, this study proposed a flexible and reliable system to be implemented by using the characteristic of agents "mobile agent" through wireless application protocol for identification of distributed Intruder. The problem appears when the limitation of data transfer when the distributed systems are used (which includes the heterogeneous database) through internet. For this reason the suggested approach will be the solution to the problem of WAP for mobile agent. Approach: The purpose of this study was to present the ability for dispatch mobile agent from a host to carry out operations directly to the remote point of interest, thus agent's scans provide an appropriate response which is faster than a hierarchical IDS that communicates with a central coordinator based elsewhere on the network. Results: The methodology was used in order to understand the mobile agent mechanism and will introduce the distributed computing mechanisms that are intended for large scale distributed systems. Since the distributed security agent models system was built using mobile agent and net, this will develop small applications for data stores, like sequential query language server. The method used the algorithms built refer to each part of the structure and the rules that implemented (users and the security agent system roles). The result was simulating the intended for business roles for both commercial and government modules, which included the solution to the problem and to architecture to be more flexible and reliable. Conclusion/Recommendations: One of main conclusion for the mobile agent used WAP protocol: To make this protocol secure when transmit the messages in the distributed system using agents chrematistics and Interaction with security agent is multi-mode providing hassle-free access to the user. Security agent alerted the users based on their alert rules. This study had new approach and idea in implementation, also presented the ability to dispatch mobile agent from a host to carry out operations directly to the remote point of interest, thus agent's scans provide an appropriate response which is faster than a hierarchical IDS that communicates with a central coordinator based elsewhere on the network.en_US
dc.language.isoenen_US
dc.publisherScience Publicationsen_US
dc.subjectCookies and proxyen_US
dc.subjectGPRSen_US
dc.subjectSecurity in WAPen_US
dc.subjectWAPen_US
dc.subjectGlobal system for mobile communicationsen_US
dc.subjectMobile communication systemsen_US
dc.subjectMobile communication systems -- Security measuresen_US
dc.titleA flexible and reliable architecture for mobile agent securityen_US
dc.typeArticleen_US
Appears in Collections:School of Computer and Communication Engineering (Articles)

Files in This Item:
File Description SizeFormat 
A flexible and reliable architecture.pdf282.64 kBAdobe PDFView/Open


Items in UniMAP Library Digital Repository are protected by copyright, with all rights reserved, unless otherwise indicated.