Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Security schemes for a mobile agent based network and system management framework
Fong C., Parr G., Morrow P. Journal of Network and Systems Management19 (2):230-256,2011.Type:Article
Date Reviewed: Jul 11 2011

In this paper, the authors discuss two frameworks for mobile agent-based network and system management schemes: the visibility domain protection scheme, and the Visa-based authentication scheme. They demonstrate the efficiency of these schemes, and compare them with simple network management protocol (SNMP) v3.

These methods employ the “latest cryptographic standards for providing [the] highest strength of encryption,” along with the option of maintaining information in different domains for security. The approach is novel in the sense that, compared to SNMP v3, “management entities are able to communicate with each other directly with encrypted messages.” Coming from the network security area, I prefer agentless monitoring solutions.

The authors use an excessive amount of jargon, and it may sometimes be difficult for readers to keep up. I would suggest reading the authors’ previous integrated framework research for guidance on the design of mobile agent-based network management schemes.

Reviewer:  Rajat Ravinder Review #: CR139226 (1112-1280)
Bookmark and Share
  Reviewer Selected
 
 
Security and Protection (C.2.0 ... )
 
 
Wireless Communication (C.2.1 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Introduction to data security and controls (2nd ed.)
Edward R. I., QED Information Sciences, Inc., Wellesley, MA, 1991. Type: Book (9780894353864)
Aug 1 1992
Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer
Davies D., Price W., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471900634)
Oct 1 1985
The development and proof of a formal specification for a multilevel secure system
Glasgow J., Macewen G. ACM Transactions on Computer Systems 5(2): 151-184, 1987. Type: Article
Oct 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy