2010
DOI: 10.1049/iet-ifs.2009.0202
|View full text |Cite
|
Sign up to set email alerts
|

Covert channel resistant information leakage protection using a multi-agent architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…Yang et al [29] focused on developing an active defense for emergencymanagement system engineering using a MAS. Bishop et al [30] proposed a mobile agent-based approach to automate the process of detecting and monitoring a colored file system for privacy protection. In this paper, we utilize multiagent technology to build our proposed BPS.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Yang et al [29] focused on developing an active defense for emergencymanagement system engineering using a MAS. Bishop et al [30] proposed a mobile agent-based approach to automate the process of detecting and monitoring a colored file system for privacy protection. In this paper, we utilize multiagent technology to build our proposed BPS.…”
Section: Literature Reviewmentioning
confidence: 99%
“…If the distributor found the document at some unauthorised place, then the unique code is extracted from the document and the guilty entity is identified. A mobile agent‐based information leakage protection system is presented in [11 ]. In this system, the contents of each file are coloured with their respective security classification code through watermarking technique and these files are monitored for potential information leakage detection.…”
Section: Introductionmentioning
confidence: 99%