期刊文献+

移动Agent安全技术的研究 被引量:2

A Research on the Security of Mobile Agent
下载PDF
导出
摘要 针对现有移动Agent安全系统在大规模开放式网络应用中存在的问题,提出了一种解决移动Agent系统安全性问题的模型———移动Agent安全管理器(MASM),给出了MASM的结构和功能,并设计了具体的实施方案;以IBM的Aglet为平台,对此模型进行了验证。说明了该方法的可行性和有效性。 According to the issues faced by existing mobile agent security system in large-scale open networks we propose and evaluate an efficient security model for a mobile agent using MASM(Mobile Agent Secure Manager) .In this paper, we describe the structure and function of the MASM and design the scheme in concrete. As follow we validate the feasibility and validity of the model base on the Aglet platform of IBM.
出处 《太原理工大学学报》 CAS 北大核心 2005年第2期149-152,共4页 Journal of Taiyuan University of Technology
基金 山西省自然科学基金资助项目(20041043)
关键词 移动AGENT 运行环境 数字签名 mobile agent execution environment digital signature
  • 相关文献

参考文献9

  • 1M Strasser. Communication Concepts for Mobile Agent[C]. In Proc the 1st International Workshop on Mobile Agents, Berlin(D), Lecture Notes in Computer Science,Springer--Verlag(D), 1997.
  • 2Hosoon Ku. An Intelligent Mobile Agent Framework for Distributed Network Management[C]. Globecom'97 Phoenix, AZ,1997.
  • 3M Strasser, M Schwehm. A Performance Model for Mobile Agent System[J]. In Proc the International Conference Parallel and Distributed Processing Techniques and Applications(PDPTA97), Stuttgart, Germany, 1997.
  • 4A Puliafito. An analytical comparison of the clientserver, remote evaluation and mobile agents paradigms, the First International Symposium on Agent Systems and Application/Mobile Agent[C]. Palm Srpings California,1999.
  • 5R S Gray. D'Agents : Security in a Multiple-- language, Mobile-- agent System[C]. G Vigna Eds, Mobile Agents and Security,Springer-Veralg, 1998.
  • 6T Sander,C R Tschundin. Protecting Mobile Agents Against Malicious Hosts[C]. G Vigna Eds, Mobile Agents and Security, Springer-Veralg, 1998.
  • 7A R Tripathi. Design of the Ajanta system for mobile agent programming[J]. The Journal of Systems and Software,2002(2) :215-217.
  • 8Hyung Jick Lee. The Use of Encryptde Functions for Mobile Agent Security[C]. Proceedings of the 37^th Hawaii InternationalConference on System Sciences, California(USA), 2004.
  • 9Taekyoung Kwon. Digital signature algorithm for securing digital identities[J]. Information Processing Letters, 2003(1) : 247-252.

同被引文献6

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部