期刊文献+

基于鉴别的等级制可信MAS的研究与设计

Research and design of hierachical trusted MAS based on authentication
下载PDF
导出
摘要 可信性问题是限制MAS技术走向成熟的关键问题之一。基于MA间的鉴别,提出了一种等级制可信MAS。论述了基于科层制思想的等级制可信MAS模型;详细论述了SA间以及SA与TA间的鉴别构建等级制可信MAS的过程;给出基于等级制可信MAS的IDS原型。分析表明,等级制可信MAS能够有效解决MAS的可信性问题,有利于促进MAS的广泛应用。 In the trusty of MAS is one of the critical problems to limit technology mature of MAS. Firstly, a hierachical trusted MAS is presented based on the thought of the departmental layer. Secondly, how to build the hierachical trusted MAS is explained through the authentication of SAs and TAs. Lastly, the prototype oflDS based on the hierachical trusted MAS is given. Analysis verifies that the hierachical trusted MAS can resolve the trusted problem, which may promote the abroad application of MAS effectively.
出处 《计算机工程与设计》 CSCD 北大核心 2007年第17期4112-4115,共4页 Computer Engineering and Design
基金 国家863高技术研究发展计划基金项目(2003AA116060) 西北农林科技大学人才基金项目(01140401) 西北农林科技大学大学生创新基金项目
关键词 等级制MAS 可信系统 相互鉴别 MAS安全 入侵检测 hierachical MAS trusted system authentication security of MAS intrusion detection system
  • 相关文献

参考文献9

二级参考文献68

  • 1王天然,朱枫,彭慧,黄闪,冯加宁,邵长生.一个开放式移动机器人体系结构[J].机器人,1995,17(4):193-199. 被引量:16
  • 2Antti Peltonen,Teemupekka Virtanen,Esa Turtiainen.Centralized Management of Virtual Security Zones in IP Networks[A].ACNS 2004[C].2004.91-102.
  • 3Jae Seung Lee,Sang Choon Kim.Design of the Decision Support System for Network Security Management to Secure Enterprise Network[A].ISC 2001[C].2001.497-511.
  • 4Sook-Yeon Kim,Myung-Eun Kim,Kiyoung Kim,et al.Information Model for Policy-Based Network Security Management[A].ICOIN 2002[C].2002.662-672.
  • 5美国ISS公司.安全管理模型技术白皮书[Z].1998.
  • 6Lekkas G P,Avouris N M.Development of Distributed Problem Solving Systems for Dynamic Enviroments[J].IEEE transactions on systems man and cybernetics,1995,25 (3):400-414.
  • 7Draa B C,Monlin B.Trends in distributed artficial intelligence[J].Artificial Intelligence,1992,56 (6):35-66.
  • 8Decker K S,Lesser V R.Analyzing the need for meta-level communication[A].Proc of IJCAI-94[C].1994.
  • 9Danicl E Neiman,David W Hildum,V R Lesser.Exploiting meta-level information in a distributed scheduling system[A].Proc of IJCAI-94[C].1994.
  • 10Elise H,Turner.Exploiting problem solving to select information to include dialogues betweencooperating agents[A].Proc of Sixteenth Annual Conference of the Cognitive Science Society[C].1994.882-886.

共引文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部