Using Non-adaptive Group Testing to Construct Spy Agent Routes
We consider a network of remote agent platforms that are tested by roaming spy agents in order to identify those that are malicious, based on the outcome of each agent. It is shown that, given a set of spying requirements, the task of choosing the sets of platforms which spy agents visit can be abst...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1019 |
---|---|
container_issue | |
container_start_page | 1013 |
container_title | |
container_volume | |
creator | Kalogridis, G. Mitchell, C.J. |
description | We consider a network of remote agent platforms that are tested by roaming spy agents in order to identify those that are malicious, based on the outcome of each agent. It is shown that, given a set of spying requirements, the task of choosing the sets of platforms which spy agents visit can be abstracted as a group testing problem. Non-adaptive group testing, in particular, is considered in greater detail, and a simple combinatorial construction for a set of agent routes is presented which combines known results from the prior art. Although existing techniques enable us to construct efficient sets of agent routes, optimality remains an open problem. |
doi_str_mv | 10.1109/ARES.2008.169 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4529455</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4529455</ieee_id><sourcerecordid>4529455</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-dc16879ee117737d538b6796aecf46cba4a3122e5bda7262489f1d68341c0de73</originalsourceid><addsrcrecordid>eNotjs1Kw0AYRQekoNYsXbmZF0idb_5nI4RQq1AU-rMuk8yXEtEkZCZC396Ins1dHLgcQu6BrQCYeyx26_2KM2ZXoN0VyZyxzGinBDAOC3I7K-OYc0JdkyzGDzYjnLBC3pCnY2y7M33ru9wHP6T2G-lm7KeBHjCmX5V6WvZdTONUJ7ofLrQ4Y5forp8SxjuyaPxnxOx_l-T4vD6UL_n2ffNaFtu8BaNSHmrQ1jhEAGOECUrYShunPdaN1HXlpRfAOaoqeMM1l9Y1EPRcCDULaMSSPPz9toh4Gsb2y4-Xk1TcSaXED_GFSEw</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Using Non-adaptive Group Testing to Construct Spy Agent Routes</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Kalogridis, G. ; Mitchell, C.J.</creator><creatorcontrib>Kalogridis, G. ; Mitchell, C.J.</creatorcontrib><description>We consider a network of remote agent platforms that are tested by roaming spy agents in order to identify those that are malicious, based on the outcome of each agent. It is shown that, given a set of spying requirements, the task of choosing the sets of platforms which spy agents visit can be abstracted as a group testing problem. Non-adaptive group testing, in particular, is considered in greater detail, and a simple combinatorial construction for a set of agent routes is presented which combines known results from the prior art. Although existing techniques enable us to construct efficient sets of agent routes, optimality remains an open problem.</description><identifier>ISBN: 9780769531021</identifier><identifier>ISBN: 0769531024</identifier><identifier>DOI: 10.1109/ARES.2008.169</identifier><identifier>LCCN: 2007909935</identifier><language>eng</language><publisher>IEEE</publisher><subject>agent routes ; Availability ; decoy agents ; Europe ; group testing ; Information security ; Mobile agents ; pooling designs ; Privacy ; Software agents ; spy agents ; Telecommunication network reliability ; Testing ; trust evaluation ; Unsolicited electronic mail</subject><ispartof>2008 Third International Conference on Availability, Reliability and Security, 2008, p.1013-1019</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4529455$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,777,781,786,787,2052,27906,54901</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4529455$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Kalogridis, G.</creatorcontrib><creatorcontrib>Mitchell, C.J.</creatorcontrib><title>Using Non-adaptive Group Testing to Construct Spy Agent Routes</title><title>2008 Third International Conference on Availability, Reliability and Security</title><addtitle>ARES</addtitle><description>We consider a network of remote agent platforms that are tested by roaming spy agents in order to identify those that are malicious, based on the outcome of each agent. It is shown that, given a set of spying requirements, the task of choosing the sets of platforms which spy agents visit can be abstracted as a group testing problem. Non-adaptive group testing, in particular, is considered in greater detail, and a simple combinatorial construction for a set of agent routes is presented which combines known results from the prior art. Although existing techniques enable us to construct efficient sets of agent routes, optimality remains an open problem.</description><subject>agent routes</subject><subject>Availability</subject><subject>decoy agents</subject><subject>Europe</subject><subject>group testing</subject><subject>Information security</subject><subject>Mobile agents</subject><subject>pooling designs</subject><subject>Privacy</subject><subject>Software agents</subject><subject>spy agents</subject><subject>Telecommunication network reliability</subject><subject>Testing</subject><subject>trust evaluation</subject><subject>Unsolicited electronic mail</subject><isbn>9780769531021</isbn><isbn>0769531024</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2008</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotjs1Kw0AYRQekoNYsXbmZF0idb_5nI4RQq1AU-rMuk8yXEtEkZCZC396Ins1dHLgcQu6BrQCYeyx26_2KM2ZXoN0VyZyxzGinBDAOC3I7K-OYc0JdkyzGDzYjnLBC3pCnY2y7M33ru9wHP6T2G-lm7KeBHjCmX5V6WvZdTONUJ7ofLrQ4Y5forp8SxjuyaPxnxOx_l-T4vD6UL_n2ffNaFtu8BaNSHmrQ1jhEAGOECUrYShunPdaN1HXlpRfAOaoqeMM1l9Y1EPRcCDULaMSSPPz9toh4Gsb2y4-Xk1TcSaXED_GFSEw</recordid><startdate>200803</startdate><enddate>200803</enddate><creator>Kalogridis, G.</creator><creator>Mitchell, C.J.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200803</creationdate><title>Using Non-adaptive Group Testing to Construct Spy Agent Routes</title><author>Kalogridis, G. ; Mitchell, C.J.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-dc16879ee117737d538b6796aecf46cba4a3122e5bda7262489f1d68341c0de73</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2008</creationdate><topic>agent routes</topic><topic>Availability</topic><topic>decoy agents</topic><topic>Europe</topic><topic>group testing</topic><topic>Information security</topic><topic>Mobile agents</topic><topic>pooling designs</topic><topic>Privacy</topic><topic>Software agents</topic><topic>spy agents</topic><topic>Telecommunication network reliability</topic><topic>Testing</topic><topic>trust evaluation</topic><topic>Unsolicited electronic mail</topic><toplevel>online_resources</toplevel><creatorcontrib>Kalogridis, G.</creatorcontrib><creatorcontrib>Mitchell, C.J.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Kalogridis, G.</au><au>Mitchell, C.J.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Using Non-adaptive Group Testing to Construct Spy Agent Routes</atitle><btitle>2008 Third International Conference on Availability, Reliability and Security</btitle><stitle>ARES</stitle><date>2008-03</date><risdate>2008</risdate><spage>1013</spage><epage>1019</epage><pages>1013-1019</pages><isbn>9780769531021</isbn><isbn>0769531024</isbn><abstract>We consider a network of remote agent platforms that are tested by roaming spy agents in order to identify those that are malicious, based on the outcome of each agent. It is shown that, given a set of spying requirements, the task of choosing the sets of platforms which spy agents visit can be abstracted as a group testing problem. Non-adaptive group testing, in particular, is considered in greater detail, and a simple combinatorial construction for a set of agent routes is presented which combines known results from the prior art. Although existing techniques enable us to construct efficient sets of agent routes, optimality remains an open problem.</abstract><pub>IEEE</pub><doi>10.1109/ARES.2008.169</doi><tpages>7</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9780769531021 |
ispartof | 2008 Third International Conference on Availability, Reliability and Security, 2008, p.1013-1019 |
issn | |
language | eng |
recordid | cdi_ieee_primary_4529455 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | agent routes Availability decoy agents Europe group testing Information security Mobile agents pooling designs Privacy Software agents spy agents Telecommunication network reliability Testing trust evaluation Unsolicited electronic mail |
title | Using Non-adaptive Group Testing to Construct Spy Agent Routes |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-18T18%3A14%3A09IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Using%20Non-adaptive%20Group%20Testing%20to%20Construct%20Spy%20Agent%20Routes&rft.btitle=2008%20Third%20International%20Conference%20on%20Availability,%20Reliability%20and%20Security&rft.au=Kalogridis,%20G.&rft.date=2008-03&rft.spage=1013&rft.epage=1019&rft.pages=1013-1019&rft.isbn=9780769531021&rft.isbn_list=0769531024&rft_id=info:doi/10.1109/ARES.2008.169&rft_dat=%3Cieee_6IE%3E4529455%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4529455&rfr_iscdi=true |