期刊文献+

可信移动Agent的研究及在分布式网络管理中的应用

Research on Trustworthy Mobile Agent and Application in the Distributed Network Management
下载PDF
导出
摘要 为解决分布式网络管理的安全问题,利用移动Agent框架作为底层平台,应用VMC概念将移动Agent和SNMPAgent相融合,构建一种基于可信移动Agent的安全体系结构。实验结果表明,采用此体系结构的网络管理系统能够确保移动Agent的可信性。因此,该体系结构在受到Agent到Agent平台或Agent到Agent攻击情况下的安全性得到评估,证明在网络管理任务中其性能是可信的。 In order to solve the security problems for distributed network management, we have developed a mobile agent-based architecture for network management. The mobile agent framework has been used as the underlying agent-platform. The VMC concept has been used for the requisite integration with SNMP agents. The results show that the network management system can assure the trustworthiness of mobile agents. Thus, security of the system has been evaluated under agent to agent platform and agent to agent attacks, and has proved trustworthy in the performance of network management tasks.
出处 《南京邮电大学学报(自然科学版)》 2009年第3期54-56,共3页 Journal of Nanjing University of Posts and Telecommunications:Natural Science Edition
关键词 移动AGENT 可信 SNMP mobile Agent trustworthy SNMP
  • 相关文献

参考文献8

  • 1周克江.基于移动Agent的协同电子商务安全认证机制[J].计算机工程,2007,33(9):163-164. 被引量:2
  • 2PASHALIDIS A,FLEURY M.Secure network management within an open-source mobile agent framework[J].Journal of Network and Systems Management,2004,12(1):9-31.
  • 3YU W,MOK A K.Enforcing resource bound safety for mobile SNMP agents[C]// 18th Annual Computer Security Applications Conference.Piscataway:IEEE,2002:69-77.
  • 4KARNIK N M,TRIPATHI A R.Security in the ajanta mobile agent system[J].Softwore-Practice and Experience,2001,31(4):301-329.
  • 5PAGUREK B,WANG Y,WHITE T.Integration of mobile agents with SNMP:Why and how[C]// IEEE/IFIP Network Operations and Management Symposium.Piscataway:IEEE,2000:609-622.
  • 6PASHALIDIS A,FLEURY M.Secure network management within an open-source mobile agent framework[J].Journal of Network and Systems Management,2004,12(1):9-31.
  • 7ROCHA A,ROCHA C A,SOUZA J N.Script MIB extension for resource limitation in SNMP distributed management environments[C]// 11th International Conference on Telecommunications.Berlin:Springler-Verlag,2004:835-840.
  • 8SCHONWALDER J,PRAS A,MATIN F J P.On the future of internet management technologies[J].Communications Magazine,2003,41(10):90-97.

二级参考文献8

  • 1Agrawal R,Gehrke J,Gonopolos D,et al.Automatic Subspace Clustering of High Dimensional Data for Data Mining Applications[C]//Proc.of ACM-SIGMOD Int.Conf.on Management of Data.1998.
  • 2Agrawal R,Srikant R.Privacy-preserving Data Mining[C]//Proc.of ACM-SIGMOD Int.Conf.on Management of Data.2000.
  • 3Mannila H,Toivonen H,Verkamo A I.Discovering Frequent Episodes in Sequences[C]//Proc.of the 1st Int.Conf.on Knowledge Discovery Databases and Data Mining.1995.
  • 4Agrawal R.Fast Discovery of Association Rules[C]//Proc.of Advances in Knowledge Discovery and Data Mining.1996.
  • 5Ribeiro C N,Zúquete A,Ferreira P.SPL:An Access Control Language for Security Policies with Complex Constraints[C]//Proc.of Network and Distributed System Security Symposium.2001.
  • 6Brewer D F C,Nash M J.The Chinese Wall Security Policy[C]//Proc.of IEEE Symposium on Research in Security and Privacy.1989.
  • 7丁建国,柳惠琳,陈涵生,白英彩.移动Agent的一种安全认证机制[J].计算机工程,2001,27(2):74-75. 被引量:20
  • 8杨青,怀进鹏,徐枞巍.基于SAML的协同电子商务安全服务系统[J].计算机工程与应用,2002,38(14):228-232. 被引量:20

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部