期刊文献+

Application of mobile scanning agent in the network security

Application of mobile scanning agent in the network security
下载PDF
导出
摘要 To enhance the security of network systems, puts forward a kind of software agent is put forward, which has the induction ability of network frameworks and the ability of behavior independence. It is mobile scanning agent. More attentions is paid to expound how to design and realize mobile scanning agent. Besides, it is also explained the programs of mobile scanning agent system. In the end, it expects mobile scanning agent. To enhance the security of network systems, puts forward a kind of software agent is put forward, which has the induction ability of network frameworks and the ability of behavior independence. It is mobile scanning agent. More attentions is paid to expound how to design and realize mobile scanning agent. Besides, it is also explained the programs of mobile scanning agent system. In the end, it expects mobile scanning agent.
出处 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2004年第3期371-376,共6页 系统工程与电子技术(英文版)
关键词 AGENT network security IMMUNITY agent transfer protocol agent, network security, immunity, agent transfer protocol
  • 相关文献

参考文献7

  • 1[1]Karnik N M, Tripathi A R. Design Issues in Mobile Agent Programming Systems. IEEE Concurrency, 1998, 6 (3): 52 - 61.
  • 2[2]Sander T, Tschudin C F. Protecting Mobile Agents Against Malicious Hosts In Mobile Agents and Security. Vigna G ed., Berlin Heidelberg: Springer-Verlag, 1998: 44~60.
  • 3[3]Corradi A, Cremonini M, Stefanelli C. Locality Abstractions and Security Models in a Mobile Agent Environment.Proc. of Seventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, Los Alamitos, CA, 1998:230~235.
  • 4[4]Cockayne W R, Zyda M. Mobile Agents. Greenwich,CT: Manning Publications Co., 1998.
  • 5[5]Minar N, Kramer K H, Maes P. Cooperating Mobile Agents for Mapping Networks. Proc. First Hungarian National Conference on Agent Based Computing, Budapest,Hungary, 1998:12.
  • 6[6]Chess D, Grosof B, Harrison C, et al. Itinerant Agents for Mobile Computing. IBM Research Report RC 20010,IBM, 1995.
  • 7[7]Kotz D, Gray R S. Mobile Agents and the Future of the Internet. ACM Operating Systems Review, 1999, 33(3):7~13.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部