期刊文献+

一个安全的移动代理系统的访问控制策略 被引量:1

Access Control Policy in a Secure Mobile Agent System
下载PDF
导出
摘要 在移动代理系统的安全策略中,防止恶意移动代理攻击主机的有效手段是采取访问控制机制,限制移动代理对本地资源的访问。提出了一个简单安全的访问控制机制,可以有效地控制移动代理在本地主机的更新及创建权限。 In the security policies of mobile agent system, the efficient measures to prevent malicious mobile agent from attacking hosts is to adopt access control mechanism to limit mobile agent access native resources. This paper proposes a simple and secure access control mechanism that can effectively control mobile agent's updating and creating ability in native host.
出处 《计算机工程》 CAS CSCD 北大核心 2002年第3期16-17,共2页 Computer Engineering
关键词 移动代理系统 访问控制策略 网络安全 计算机网络 Mobile agent Access control Uniform resource name
  • 引文网络
  • 相关文献

参考文献1

  • 1朱向华.移动对象系统安全机制与名字服务的设计与实现:硕士学位论文[M].上海:上海交通大学,2000..

同被引文献14

  • 1Tomas S, Christain T. Protecting Mobile Agents Agmnst Malicious Host[EB/OL]. Http://www. icsi .berkeley.edu/sander/publications .
  • 2Vigna G. Protecting Mobile Agents Through Tracing[ C]. In 3th ECOOP Workshop on Mobile Object System, Finland, Jun, 1997.
  • 3Wenke Lee, Sal Stolfo, and Kui Mok. A Data Mining Framework for Building Intrusion Detection Models[C]. IEEE Symposium on Security and Privacy, May, 1999:120 - 132.
  • 4Guy Helmer, Johnny S. K. Wong, Vasant Honavar, and Les Miller. Intelligent Agents for Intrusion Detection[C] IEEE Information Technology Conference, Sep, 1998:121 - 124.
  • 5Serge Fenet and Salima Hassas. A Distributed Intrusion Detection and Response System Based on Mobile Autonomous Agents Using Social Insects Communication Paradigm[ C]. First International Workshop on Security of Mobile Multiagent Systems, Autonomous Agents Conference, May,2001.
  • 6F. Hohl. Time limited blackbox security: Protecting mobile agents from malicious hosts. In G. Vigna, editor, Mobile Agents and Security[A]. Lecture Notes in Computer Science[C]. Springer- VerLag, 1998,vol. 1419:92- 113.
  • 7Tomas S, Christain T. Protecting Mobile Agents Against Malicious Host[EB/OL]. Http://www. icsi .berkeley.edu/sander/publications.
  • 8Midori Asaka, Shunji Okazawa, Atsushi Taguchi, and Shigeki Goto. A Method of Tracing Intruders by Use of Mobile Agents[C]. INET'99 Conference, June, 1999.
  • 9Wenke Iee, Sal Stolfo, and Kui Mok. A Data Mining Framework for Building Intrusion Detection Models[C]. IEEE Symposium on Security and Privacy, May, 1999:120 - 132.
  • 10Guy Hehner, Johnny S. K. Wong, Vasant Honavar, and Les Miller. Intelligent Agents for Intrusion Detection[C]. IEEE Information Technology Conference, Sep, 1998:121 - 124.

引证文献1

;
使用帮助 返回顶部