期刊文献+

Pivotal Technology Research of Grid Based on Mobile Agent 被引量:5

Pivotal Technology Research of Grid Based on Mobile Agent
原文传递
导出
摘要 Grid Based on Mobile Agent is a new grid scheme.The purpose of the paper is to solve the pivotal technology ofGrid Based on Mobile Agent(GBMA)combined with thought of Virtual Organization(VO).In GBMA,virtual orga-nization is viewed as the basic management unit of the grid,and mobile agent is regarded as an important interactivemeans.Grid architecture,grid resource management and grid task management are the core technology problem of GB-MA.The simulation results showy that Inter-VO pattern has the obvious advantage because it can make full use of resourcesfrom other virtual organizations in GBMA environment. Grid Based on Mobile Agent is a new grid scheme.The purpose of the paper is to solve the pivotal technology ofGrid Based on Mobile Agent(GBMA)combined with thought of Virtual Organization(VO).In GBMA,virtual orga-nization is viewed as the basic management unit of the grid,and mobile agent is regarded as an important interactivemeans.Grid architecture,grid resource management and grid task management are the core technology problem of GB-MA.The simulation results showy that Inter-VO pattern has the obvious advantage because it can make full use of resourcesfrom other virtual organizations in GBMA environment.
出处 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2004年第4期60-64,共5页 中国邮电高校学报(英文版)
基金 Foundationitem:ThisworkissupportedbyNationalNaturalScienceFoundationofChina(No.60173037&70271050)NaturalSclenceFoundationofJiangsuProvince(No.BK2003105&BK2004218)National"863"HighTechnologyResearchProgramofChina(2004AA775053)HighTechnologyResearchProgrammeofJiangsuProvinc(No.BG2004004)KeyLaboratoryofInformationTechnologyProcessingofJiangsuProvince(No.kjs03061&kjs04).
关键词 GRID mobile agent virtual organization pivotal technology grid mobile agent virtual organization pivotal technology
  • 相关文献

参考文献15

  • 1[1]FOSTER I, KESSELMAN C, TUECKE S. The Anatomy of the Grid: Enabling Scalable Virtual Organizations [ J ].International Journal of High Performance Computing Applications, 2001, 15(3): 200 - 222.
  • 2[2]Demchenko Yuri. Virtual Organisations in Computer Grids and Identity Management[J]. Information Security Technical Report. 2004, 9 (1): 59 - 76.
  • 3[3]GRAY R S. Agent TCL: a flexible and secure mobile agent system [ A ]. Proceedings 1996 Tcl/Tk Workshop [ C ].Berkeley(CA): USENIX Assoc, 1996, 9 - 23.
  • 4[4]WANG Ru-chuan, MU Hong, XU Xiao-long, et al. Building grid computing environment with mobile agent Technology [ A]. Proceedings of the International Workshop on Grid and Cooperative Computing [ C ]. Beijing (China):House of Electronics Industry, 2002. 1075 - 1084.
  • 5[5]BIESZCZAD A, PAGUREK B, WHITE T. Mobile Agents for Network Management [ J ]. IEEE Commuciation Surveys, 1998, 1(1): 2-9.
  • 6LIJie,WANGRu-chuan.Study of the Improvement on Network Management Performance with Mobile Agent[J].The Journal of China Universities of Posts and Telecommunications,2003,10(3):11-16. 被引量:9
  • 7[7]PULIAFITO A, TOMARCHIOO O. Using mobile agent to implement flexible management strategies [ J ]. Computer Communication, 2000, 23(8): 707-719.
  • 8[8]MAGEDANZ T, ECKARDT T. Mobile service agents and their impacts on IN-based services architectures [A]. Proceedings of IEEE Intelligent Network Workshop [ C ]. New York: IEEE, 1996.
  • 9[9]FERIDUN M, KRAUSE J. A framework for distributed management with mobile components [ J ]. Computer Networks, 2001, 35(1): 25- 38.
  • 10[10]RAIDULET C, DEMARTINI C. Mobile agent technology for the management of distributed system- a case Study [J]. Computer Network, 2000, 34(6):823-830.

二级参考文献36

  • 1[1]TENNENHOOSE D, SMITH J M, SINCOSKIE S W D, et al. A survey of active network research[J]. IEEE Communications Magazine, 1997, 35(1): 80-86.
  • 2[2]GRAY R S. Agent TCL: a flexible and secure mobile-agent system[A]. Proceedings 1996 Tcl/Tk Workshop[C]. Berkeley (CA): USENIX Assoc,1996.9-23.
  • 3[3]SMITH J M, CARVERT K L, MURPHY S L, et al. Activating networks: a progress report[J]. Computer, 1999, 32(4): 32-41.
  • 4[4]ZHANG T, MAGEDANZ T, COVACI S, et al. Ingelligent agents-interoperability and integration issues[A]. Proceedings of 4th International Symposium on Interworking[C]. Offawa(Canada), 1998. 6-10.
  • 5[5]YOUNG A, YUNG M. Sliding encryption: a cryptographic tool for mobile agents[A]. Proceeding of the 4th Internet Workshop[C]. Berlin (Germany): Springer-Verlag, 1997.230-241.
  • 6[6]KARJOTH G, LANGE D B, OSHIMA M. The aglet security model[J]. Computer,1997,30(7): 634-646.
  • 7[7]SATOH I. Network processing of mobile agents, by mobile agents,for mobile agents[A]. Proceedings of the 3th International Workshop, MATA 2001[C]. Berlin(Germany): Springer-Verlag,2001.81-92.
  • 8[8]VIGNA G. Protection mobile agents through tracing[A]. Proceedings of the Third ECOOP Workshop on Mobile Object Systems[C]. Jyvalskyla(Finland), 1997.137-153.
  • 9[9]FARMER W M, GUTTMAN J D, SWARUP V. Security for mobile agents: authentication and state appraisal[A]. Proceedings of the 4th European Symposium on Research in Computer Security[C]. Berling (Germany): Springer-Verlag, 1996.118-130.
  • 10[10]WAHBE R, LUCCO S, ANDERSON T E, et al. Efficient software based fault isolation[J]. Operating System Review, 1993,27(5): 203-216.

共引文献12

同被引文献18

引证文献5

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部