期刊文献+

移动代理系统安全体系结构研究 被引量:1

Research on Security Architecture of Mobile Agent System
下载PDF
导出
摘要 本文对移动代理系统作了简要介绍。阐述了由于其移动性而引发的安全问题和安全需求。介绍了移动代理系统安全技术及其体系结构研究现状,对它们的优缺点进行了分析。
作者 陈良 高成敏
出处 《计算机系统应用》 2006年第6期34-36,40,共4页 Computer Systems & Applications
  • 相关文献

参考文献7

  • 1Dale,J.A mobile agent architecture for distributed information management [ Ph.D.Thesis].Southampton:University of Southampton,1997.65 ~ 98.
  • 2Alfonso Fuggetta,Member,IEEE,Gian Pietro Picco,Member,IEEE,and Giovanni Vigna,Member,IEEE,Understanding Code Mobility,IEEE TRANSACTIONS ON SOFTWARE ENGINEERING,VOL.24,NO.5,MAY 1998.
  • 3朱淼良,邱瑜.移动代理系统综述[J].计算机研究与发展,2001,38(1):16-25. 被引量:105
  • 4W Jansen,T Karygiannis.Mobile agent security.NIST Special Publication 800-19,NIST,2000.
  • 5William M Farmer,Joshua D Guttman,Vipin Swarup.Security for mobile agents:issues and requirements.Baltimore (ed.),Proceedings of the 19th National Information Systems Security Conference,pp 591-597,1996.
  • 6王汝传,徐小龙,郑晓燕,孙知信.移动代理安全机制模型的研究[J].计算机学报,2002,25(12):1294-1301. 被引量:53
  • 7王济勇,温涛,李春光,汪大为,魏海平,林涛.一个基于Java的Mobile Agent安全体系结构模型[J].计算机工程与应用,2000,36(10):141-144. 被引量:8

二级参考文献14

  • 1Li Gong,Java Security Architecture(JDK1.2),1998年
  • 2Bull J,Proceedings of the Second European Symposium on Research in Computer Security ES,1992年,11卷,3页
  • 3Wong D,Mobile Agents First Int Workshop MA'97,1997年
  • 4Young A,Proc of the 4th Int Workshop FSE'97,1997年
  • 5Chess D. Security Issues in mobile code systems. In: Vigna G ed. Mobile Agent Security, 1998. 1-14
  • 6Karnik N M, Tripathi A R. Design issues in mobile agent programming systems. IEEE Concurrency, 1998, 6(3) :52-61
  • 7Wilhelm U G, Saamann S M, Buttyan L. A pessimistic approach to trust in mobile agent platforms. IEEE Ccmputing, 2000,10(4) :40-48
  • 8Martin Schaaf, Frank Maure. Integrating Java and CORBA: A programmer' s perspective. IEEE Internet Computing, 2001,7 (1) :72-78
  • 9Wang X F, Yi X, Lam K Y. Secure information agent for inter net trading. In: Proc the 11th Australian Joint Conference on Artificial Intelligence'98, Brisban, Australia, 1998. 183-194
  • 10Farmer W M, Gutman J D, Swarup V. Security for mobile a gents: Authentication and state appraisal. In: Proc the 4th European Symposium on Research in Computer Security, Rome, Italy, 1996. 18-130

共引文献163

同被引文献12

  • 1陈志贤,王汝传,王绍棣,孙知信.一种基于混合加密的移动代理安全传输模型[J].电子与信息学报,2004,26(9):1407-1412. 被引量:2
  • 2GUAN Huanmei,MENG Xuejun,ZHANG Huanguo.A Forward Integrity and Itinerary Secrecy Protocol for Mobile Agents[J].Wuhan University Journal of Natural Sciences,2006,11(6):1727-1730. 被引量:1
  • 3张云勇 刘锦德.移动agent技术[M].北京:清华大学出版社,2003..
  • 4Gupta R, Kansal G. Survey on comparative study of mobile a- gent platforms [ J ]. International Journal of Engineering Sci- ence and Technology ,2011,3 ( 3 ) : 1943-1948.
  • 5Greenberg M 3, Jenniler ~. Mobde agent and security [ J ]. IEEE Communication Magazine, 1998,36 ( 7 ) :76- 85.
  • 6Borselius N. Mobile agent security[ J]. Electronics & Commu- nication Engineering Journal,2002,14 (5) : 21 1-218.
  • 7Corradi A, Cremonini M. Agents integrity for electronic com- merce application [ J ]. Information System, 1999,24 (6) :519- 533.
  • 8Min Yao, Kun Peng, Ed Dawson. Using "Fair Forfeit" to pre- vent truncation attack on mobile agents [ C]//Proc of 10th Australasian Conference. [ s. I. ] : [ s. n. ] ,2005:158-169.
  • 9Ouardani A, Pierre S, Boucheneb H. A security protocol for mobile Agent based upon the cooperation of sedentary Agents [ J ]. Journal of Network and Computer Applications, 2007,30 (3) :1228-1243.
  • 10王汝传,徐小龙,郑晓燕,孙知信.移动代理安全机制模型的研究[J].计算机学报,2002,25(12):1294-1301. 被引量:53

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部