期刊文献+

基于移动代理的工作流原型研究与设计 被引量:1

Research of workflow prototype for mobile agent-based
下载PDF
导出
摘要 快速发展的移动代理和网格技术给工作流提供了新的集成各种分布式资源的计算环境。传统的工作流架构有很多弱点,比如在动态环境中缺少灵活性等。提出了一个集成WebServices,网格,工作流和移动代理技术的分布式工作流架构,可以通过移动代理间的通讯来达到工作流之间协同工作,而且这个架构增强了工作流的灵活性和可靠性。以这个新的模型为基础实现了一个具体的工作流工作站,且可实现系统的安全使用。 The developing mobile agent and grid technologies provide workflow with a computing environment by means of integrating various distributed resources. The traditional architecture for workflow has many weaknesses, such as architecture lacks greatly agility in a dynamic environment. A distributed workflow architecture is proposed, which integrates concepts and technologies fi'om web services, grid, workflow and mobile agent. With this approach, coordination ofworkflow are achieved by communication between mobile agents. Moreover, this approach enhances flexible and reliability. Finally, the workstation ofworkflow based on this prototype is implemented, and the system becomes more secure.
出处 《计算机工程与设计》 CSCD 北大核心 2006年第14期2570-2572,2593,共4页 Computer Engineering and Design
基金 湖南文理学院科研项目基金项目(JJYB05015) 湖南省教育厅项目基金项目(03C276)
关键词 移动代理 工作流 WEB服务 网格 结构模型 mobile agent workflow web service grid basic structure
  • 相关文献

参考文献7

二级参考文献46

  • 1汪芸.CORBA技术及其应用[M].东南大学出版社,1999..
  • 2[1]Wayne Jansen, Peter Mell,Tom Karygiannis,Don Marks.Ap-plying Mobile Agents to Intrusion Detection and Response.IST Interim Report (IR)-6416 October 1999 [R]. NIST,1999,2,5-7.
  • 3[2]Todd Sundsted. An introduction to agents [EB/OL]. http://www.javaworld.com/jw-06-1998/jw-06-howto.html, 1998.
  • 4[3]Hyacinith S Nwana. Software Agents: An Overview. Know-ledge Engineering Review[M].Knowledge Engineering Re-view, 1996.
  • 5[4]Jansen W, Mell P, Karygiannis T, Marks D. Mobile Agents inIntrusion Detection And Response [R]. Proceeding of 12thAnnual Canadian Information Technology Security Sympo-sim,Ottawa, Canada,June 2000.
  • 6[5]Mark Slagell. The degsign and Implementation of MAIDS[EB/OL]. http://latte.cs.iastate.edu/ms/cc.html.
  • 7[6]Asaka M,Okazawa S,Taguchi A,Goto S. A Method of Trac-ing Intruders by use of Mobile Agents [J]. INET99, June1999.
  • 8[7]Intrusion Detection Hotlist[EB/OL].July 1998. http://www.cerias.purdue.edu/coast/ids/.
  • 9[8]Guy Helmer, Johnny S.K.Wong,Vasant Honavar and Les Mil-ler. Intelligent Agents for Intrusion Detection[J]. Proceedingof the IEEE information Technology Conference,Syracuse,NY, September 1998.
  • 10[9]Wayne Jansen, Tom Karygiannis. Mobile Agents and Secur-ity[M]. NIST Special Publication 800-19, 1999.

共引文献48

同被引文献6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部