期刊文献+

基于移动Agent的分布式数据库的协同安全模型 被引量:3

Cooperative security model for mobile Agent based distributed database system
下载PDF
导出
摘要 随着各种分布式计算的广泛应用,移动Agent技术引起了人们越来越多的关注。在移动Agent的应用环境中,数据传输、服务器资源、移动Agent运行环境和移动Agent自身安全等方面的安全性问题日益突出。同时移动Agent应用系统中各个数据处理Agent之间的自主进行协商和协调也是一个有待解决的问题。针对这些问题,提出了一种基于移动Agent的分布式数据库的协同安全模型,来初步解决移动Agent的分布式数据库安全性和Agent之间协调工作的问题。 With the widespread use of various distributed computing applications, mobile Agent technique attracts more and more attentions of researchers. In the environment of mobile Agent, the problems of security about data transports, associated with the resource of server, the mobile Agent execution platform and its self-security become more serious. Meanwhile, the self-negotiation and coordination among the Agents for data processing, which are involved in the application systems of mobile Agent, are looking forward to solutions. In allusion to these problems, the cooperative security model for mobile Agent based on distributed database system is provided to elementary solve the cooperative of the work among the Agents and some security of the database.
出处 《计算机工程与设计》 CSCD 北大核心 2007年第11期2569-2571,2636,共4页 Computer Engineering and Design
基金 湖北省自然科学基金项目(2005ABA245)。
关键词 计算机支持的协同工作 分布式数据库 角色协同式移动代理 安全策略 协同安全模型 CSCW distributed database system RCMA security policy cooperative security mode model
  • 相关文献

参考文献10

二级参考文献44

  • 1[1]Chess D. Security Issues in mobile code systems. In: Giovanni Vigna ed. Mobile Agent Security,1998. 1~14
  • 2[2]Karnik N M, Tripathi A R. Design issues in mobile Agent programming systems. IEEE Concurrency, 1998, 6(3): 52~61
  • 3[3]Uwe G Wilhelm, Sebastian M Saamann, Levente Buttyan. A pessimistic approach to trust in mobile Agent platforms. IEEE Computing , 2000,4(5): 40~48
  • 4[4]Vu Anh Pham, Ahmed Karmouch. Mobile software Agent. IEEE Communication Magazine, 1998,36(7): 26~37
  • 5[5]Michael S.Greenberg,Byington J.C. Mobile Agents and security. IEEE Communication Magazine, 1998,36(7): 76~85
  • 6[6]Martin Schaaf, Frank Maure. Integrating Java and CORBA:A programmer's perspective. IEEE Internet Computing, 2001,5(1): 72~78
  • 7[7]Farmer W M, Gutman J D, Swarup V. Security for mobile Agents: Authentication and state appraisal. In: Proceedings of the 4th European Symposium on Research in Computer Security, Rome, Italy, 1996. 18~130
  • 8[8]Bruce Eckel. Thinking in Java. 2nd Edition, Release 11. New Jersey: Prentice-Hall, 2000
  • 9[9]Davies W, Price W L. Security for Computer Networks. Chichesfer: John Wiley & Sons, 1989
  • 10[10]Pfleeger C P. Security in Computing. 2nd Edition. Upper Saddle River, New Jersey: Prentice Hall, 1997

共引文献83

同被引文献18

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部