期刊文献+

A Review on Distribution Model for Mobile Agent-Based Information Leakage Prevention

A Review on Distribution Model for Mobile Agent-Based Information Leakage Prevention
下载PDF
导出
摘要 With the continuous use of cloud and distributed computing, the threats associated with data and information technology (IT) in such an environment have also increased. Thus, data security and data leakage prevention have become important in a distributed environment. In this aspect, mobile agent-based systems are one of the latest mechanisms to identify and prevent the intrusion and leakage of the data across the network. Thus, to tackle one or more of the several challenges on Mobile Agent-Based Information Leakage Prevention, this paper aim at providing a comprehensive, detailed, and systematic study of the Distribution Model for Mobile Agent-Based Information Leakage Prevention. This paper involves the review of papers selected from the journals which are published in 2009 and 2019. The critical review is presented for the distributed mobile agent-based intrusion detection systems in terms of their design analysis, techniques, and shortcomings. Initially, eighty-five papers were identified, but a paper selection process reduced the number of papers to thirteen important reviews. With the continuous use of cloud and distributed computing, the threats associated with data and information technology (IT) in such an environment have also increased. Thus, data security and data leakage prevention have become important in a distributed environment. In this aspect, mobile agent-based systems are one of the latest mechanisms to identify and prevent the intrusion and leakage of the data across the network. Thus, to tackle one or more of the several challenges on Mobile Agent-Based Information Leakage Prevention, this paper aim at providing a comprehensive, detailed, and systematic study of the Distribution Model for Mobile Agent-Based Information Leakage Prevention. This paper involves the review of papers selected from the journals which are published in 2009 and 2019. The critical review is presented for the distributed mobile agent-based intrusion detection systems in terms of their design analysis, techniques, and shortcomings. Initially, eighty-five papers were identified, but a paper selection process reduced the number of papers to thirteen important reviews.
作者 Alese Boniface Kayode Alowolodu Olufunso Dayo Adekunle Adewale Uthman Alese Boniface Kayode;Alowolodu Olufunso Dayo;Adekunle Adewale Uthman(Computer Science Department, Federal University of Technolog, Akure, Nigeria;Computer Science Department, Federal Polytechnic, Ede, Osun State, Nigeria)
出处 《Communications and Network》 2021年第2期68-78,共11页 通讯与网络(英文)
关键词 Mobile Agent Distribution Model Data Leakage Detection Data Leakage Prevention DLP SECURITY Distributed Computing Mobile Agent Distribution Model Data Leakage Detection Data Leakage Prevention DLP Security Distributed Computing
  • 相关文献

参考文献1

二级参考文献10

  • 1Richardson R, Peters S. CSI Computer Crime and Security Survey 2007 [R]. New York: Computer Security Institute, 2007.
  • 2Bonatti P, Vimercati S D C D, Samarati P. An algebra for composing access control policies [J]. ACM Transactions on Information and System Security, 2002, 5(1): 1-35.
  • 3Jajodia P, Samarati P, Sapino M L, et al. Flexible support for multiple access control policies [J]. ACM Transactions on Database Systems, 2001, 26(2): 214-260.
  • 4Cheng P C, Rohatgi P, Keser C, et al. Fuzzy multi-level security: An experiment on quantified risk-adaptive access control [C] //2007 IEEE Symposium on Security and Privacy. Oakland: The IEEE Computer Society Press, 2007: 222-230.
  • 5Jason Program Office. Horizontal Integration: Broader Access Models for Realizing Information Dominance [R]. Mclean: MITRE Corporation, 2004.
  • 6Srivatsa M, Balfe S, Paterson K G, et al. Trust management for secure information flows [C]// 15th ACM Conference on Computer and Communications Security. Alexandria: ACM Press, 2008: 175-188.
  • 7Papadimitriou P, Garcia-Molina H. A model for data leakage detection[C] //25th International Conference on Data Engineering. Shanghai: IEEE Computer Society Press, 2009: 1307-1310.
  • 8Li Y J, Swamp V, Jajodia S. Fingerprinting relational databases: schemes and specialties [J]. IEEE Transactions on Dependable and Secure Computing, 2005, 2(1): 34-45.
  • 9Agrawal R, Kieman J. Watermarking relational databases [C]//28th International Conference on Very Large Data Bases. Hong Kong: Morgan Kaufmann Publishers, 2002:155-166.
  • 10张晓菲,许访,沈昌祥.基于可信状态的多级安全模型及其应用研究[J].电子学报,2007,35(8):1511-1515. 被引量:14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部