期刊文献+

移动智能体安全通信机制研究

Research of Mobile Agent Communication Security
下载PDF
导出
摘要 移动智能体除具备智能体,多智能体系统已有的技术特点外,它可以按照任务执行的需要,移动到网络节点上去工作。其主要技术特征是实现计算执行程序的异地执行,必须解决移动智能体的安全通信问题。设计了IBMAS,对移动Agent计算进行了系统支持。它提供移动机制、通信机制和安全机制,从而便于用户在此基础上进行应用程序的开发和实际应用。 This paper expounds basic principles of artificial neural network(ANN),and with regard to the problem of predicting donor sites of genes,the data was disposed,ANN model was established and improved.The results indicate that predicting donor sites by means of ANN is feasible and the means has high accuracy.Mobile agent system has the character of agent,multi-agent system,what' s more it can work by moving to network node according to the execution of mission.It is necessary to guarantee the communication security of the mobile agent.This paper implements a mobile agent system called IBMAS,provides a systematic support for the mobile agent based computing in three important aspects,i.e.,the agent migration mechanism,the inter-agent communication,and the security protection.IBMAS also supports mobile agent systems developing and applying.
作者 宋四新
出处 《计算机与数字工程》 2008年第3期70-73,共4页 Computer & Digital Engineering
关键词 移动智能体 网络安全 智能体传输协议 mobile agent,network security,agent transfer protocol
  • 相关文献

参考文献5

二级参考文献19

  • 1吕建 陶先平 等.基于Internet的移动agent系统总体设计报告(南京大学计算机软件新技术国家重点实验室技术报告)[M].,..
  • 2吕建,基于Internet的移动agent系统总体设计报告
  • 3Gray, R.S., Cybenko, G., Kotz, D., et al. D'Agents: security in a multiple -language, mobile-agent system. In: Vigna, G., ed. Mobile Agents and Security. L ecture Notes in Computer Science 1419, Berlin: Springer-Verlag, 1998. 154~187.
  • 4Chess, D., Harrison, C., Kershenbaum, A. Mobile agents: are they a good id ea? 1994. http://www.research.ibm.com/iagents/paps/ mobile_idea.pdf.
  • 5Wahbe, R., Lucco, S., Anderson, T.E., et al. Efficient software-based faul t isolation. ACM SIGOPS Operating Systems Review, 1993,27(5):203~216.
  • 6Farmer, W., Guttman, J., Swarup, V. Security for mobile agents: authentica tion and state appraisal. In: Bertino, E., ed. Proceedings of the Computer Secur ity--ESORICS'96. Lecture Notes in Computer Science 1146, 1996. 118~130.
  • 7Necula, G.C., Safe, P.L. Untrusted agents using proof-carrying code. In: V igna, G., ed. Mobile Agents and Security. Lecture Notes in Computer Science 1419 , Berlin: Springer-Verlag, 1998. 61~91.
  • 8Roth, V. Secure recording of itineraries through cooperating agents. 1998. http://cuiwww.unige.ch/~ecoopws/ws98/papers/ vroth98c.ps.
  • 9Freier, A.O., Karlton, P., Kocher, P.C. The SSL protocol. 1996. http://hom e.netscape.com/eng/ssl3/ssl-toc.html.
  • 10Czajkowski, G., von Eicken, T. JRes: a resource accounting interface for Java. ACM SIGPLAN Notices, 1998,33(10):21~35.

共引文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部