期刊文献+

移动Agent安全方案的分析与研究 被引量:1

Analysis and Research on Security Scheme for Mobile Agent
原文传递
导出
摘要 针对移动Agent在其生命周期内的安全威胁,提出了一个完整、健壮的移动Agent安全方案。首先以层次授权建立了Agent社会的结构方案,这种由上自下的安全授权机制解决了整个Agent社会对Agent和Agent平台用户身份的鉴别;其次为了保护通讯的安全性,将Agent平台架构在SSL协议之上;最后利用模糊技术确保了移动Agent在迁移过程中的代码安全。 In this paper, aimed at the security threats against mobile agent in its life-time, a complete and robust protection scheme is proposed. Firstly, the structural scheme of agent society is designed based on level-licensing. This from-top-to-bnttom security licensing scheme solves the problem of discriminating the agent's identity. Secondly, to protect the security of communication, the agent landscape is constructed on the SSL protocol. Finally, with fuzzy technology, the codes security in transferring process is ensured.
作者 赵纪平
出处 《通信技术》 2008年第12期274-276,共3页 Communications Technology
关键词 移动代理 安全 方案 Mobile Agent Security Scheme
  • 相关文献

参考文献3

  • 1祝清学,李青.保护移动代理的新方案[J].计算机工程,2005,31(23):135-137. 被引量:1
  • 2Foss A J, Harrison S S, Hyungjick h. The use of encrypted functions for mobile agent security[A], in Proceedings of the 37th Hawaii International Conference on System Sciences[C]. Hawaii: IEEE Computer Society, 2004:297-306.
  • 3Farag Azzedin, Muthucumaru Maheswaran. Evolving and Managing Trust in Grid Computing Systems[J].Proceedings of the IEEE Canadian Conference on Electrical&Computer Engineering 2002, (12):112-120

二级参考文献5

  • 1Vigna G. Protecting Mobile Agents Through Tracing[C]. Mobile Object Systems ECOOP Workshop'97. http://arthur.cs.ucdavis, edu/Nbarnes/seminar/papers/vigna97.ps, 1997.
  • 2Hohl F. A Protocol to Detect Malicious Hosts Attacks by Using Reference States[C]. University at Stuttgart, Fakultat Informatik,Bericht Nr, ftp://ftp.informatik.uni-stuttgart.de/pub/library/ncstrl.ustuttgart-fi/TR-1999-09/TR-1999-09.ps.gz, 1999.
  • 3Hohl F. A Framework to Protect Mobile Agents by Using Reference States[C]. In: Proceedings of the 20^th International Conference on Distributed Computing Systems (ICDCS 2000), http://mole.informatik.uni-stuttgart.de/papers/icdcs2000hohl.pd f.
  • 4周冲,孙永强.PTIR:一个用于检测恶意主机攻击的记录协议[J].计算机研究与发展,2002,39(3):295-300. 被引量:4
  • 5谭湘,顾毓清,包崇明.移动agent系统安全性研究综述[J].计算机研究与发展,2003,40(7):984-993. 被引量:18

同被引文献3

  • 1Dierks Allen C.The TLS Protocol(Version 1.0)[S].RFC 2246,1999-01.
  • 2Penserini L,Perini A,Susi A,et al.From Stakeholder Intentions to Software Agent Implementations[C] f.Proc of the 18th Conf on Advanced Information Systems Engineering,2006:465-479.
  • 3张云勇 刘锦德.移动agent技术[M].北京:清华大学出版社,2003..

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部