期刊文献+

一种改进的基于Web的移动代理的设计 被引量:1

Design of the Modified Mobile Agents Based on Web
下载PDF
导出
摘要 移动代理系统的特点是移动性,自治性和智能性。在移动代理技术拥有完整性保护后,移动代理就可以免于被恶意的主机和其他代理攻击。传统的移动代理是由固定的代码段组成的,提出了一种改进的移动代理方法(MMA),这种方法可以在执行需求时动态添加新的代理代码模块,也可以删除冗余的代码模块。在基于Web的系统中这种方法比传统的静态方法更加灵活有效。 Mobility, autonomy, and intelligence are the features of mobile agent systems. On integrity protection within mobile agent technology, mobile agent can be protected against attacks from malicious hosts and other agents. The traditional mobile agents consist of fixed code parts. In this paper,we design Modified Mobile Agents (MMA) which consists of flexibly upgradeable agent code part. New agent code modules can dynamically be added and redundant code modules can be deleted on the executing requirement. MMA prove to be more flexible in agent - based web systems compared to the traditional static - type mobile agent.
作者 王燕 李晓华
出处 《现代电子技术》 2007年第14期150-152,共3页 Modern Electronics Technique
关键词 移动代理 WEB 智能代理 MMA mobile agent Web agent intelligent MMA
  • 相关文献

参考文献3

  • 1Zhu F M,Guan S U,Yang Y.Safer E-Commerce:Secure Agent Fabrication,Evolution & Roaming for E-Commerce.Intemet Commerce and Software Agents:Cases,Technologies and Opportunities,IDEA Group Publishing,2000:190-206.
  • 2Guan S U,Yang Y.Safe:Secure-Roaming Agent For E-Commerce.Proc.of the 26th International Conference on Computers & Industrial Engineering,1999:33-37.
  • 3王汝传,徐小龙,郑晓燕,孙知信.移动代理安全机制模型的研究[J].计算机学报,2002,25(12):1294-1301. 被引量:53

二级参考文献9

  • 1Chess D. Security Issues in mobile code systems. In: Vigna G ed. Mobile Agent Security, 1998. 1-14
  • 2Karnik N M, Tripathi A R. Design issues in mobile agent programming systems. IEEE Concurrency, 1998, 6(3) :52-61
  • 3Wilhelm U G, Saamann S M, Buttyan L. A pessimistic approach to trust in mobile agent platforms. IEEE Ccmputing, 2000,10(4) :40-48
  • 4Martin Schaaf, Frank Maure. Integrating Java and CORBA: A programmer' s perspective. IEEE Internet Computing, 2001,7 (1) :72-78
  • 5Wang X F, Yi X, Lam K Y. Secure information agent for inter net trading. In: Proc the 11th Australian Joint Conference on Artificial Intelligence'98, Brisban, Australia, 1998. 183-194
  • 6Farmer W M, Gutman J D, Swarup V. Security for mobile a gents: Authentication and state appraisal. In: Proc the 4th European Symposium on Research in Computer Security, Rome, Italy, 1996. 18-130
  • 7Bruce Eckel. Thinking in Java, 2nd Edition. New Jersey: Pren tice-Hall, 2000
  • 8Pfleeger C P. Security in Computing. 2nd Edition. Upper Sad dle River, New Jersey: Prentice Hall, 1997
  • 9Davies W, Price W L. Security for Computer Networks. Chich esfer: John Wiley & Sons, 1989

共引文献52

同被引文献1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部