期刊文献+

The Research on Mobile-agent Security 被引量:7

The Research on Mobile-agent Security
原文传递
导出
摘要 Mobile agent technology offers a new computing paradigm in which a program,in the form of a software agent, can suspend its execution in a host computer, transfer itself toanother agent - enabled host in the network , and resume execution of the new host. As thesophistication of mobile software has increased 'with the time, so have the associated threats tosecurity. This paper provides an overview of the range of threats facing the designers of mobileagent. The paper also identifies generic security objectives, and a range of measures for counteringthe identified threats. Mobile agent technology offers a new computing paradigm in which a program,in the form of a software agent, can suspend its execution in a host computer, transfer itself toanother agent - enabled host in the network , and resume execution of the new host. As thesophistication of mobile software has increased 'with the time, so have the associated threats tosecurity. This paper provides an overview of the range of threats facing the designers of mobileagent. The paper also identifies generic security objectives, and a range of measures for counteringthe identified threats.
出处 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2002年第3期47-52,共6页 中国邮电高校学报(英文版)
关键词 mobile agent SECURITY agent platform malicious platform mobile agent security agent platform malicious platform
  • 相关文献

参考文献15

  • 1SHI Zhong-zhi. Intelligent agent and applications [M]. Beijing: Science Press, 2000.
  • 2QUSAY H MAHMOUD. Distributed programming with Java [M]. USA: Manning Publications, 2002.
  • 3ZHANG Yun-yong. Mobile agent and applications [M]. Beijing: Tsinghua University Press, 2002.
  • 4GERHARD WESS. Mutiagent system[M]. USA: The MIT Press, 1999.
  • 5JANSEN WAYNE, KARYGIANNIS TOM. Mobile agent security[R]. USA: National Institute of Standards and Technology, 1999.
  • 6GRAY ROBERT. Mobile agent security[R]. France: Secure Internet Mobile Computations, 1998.
  • 7Mitsubishi Electric ita. Mobile agent computing -- A white paper[R]. USA: Mitsubishi Electric ITA Horizon Systems Laboratory, 1998.
  • 8KARNIK NEERAN. Security in mobile agent systems[D]. USA: Department of Computer Science and Engineering, University of Minnesota, 1998.
  • 9CHESS D. Security issues in mobile code systems[A]. Giovanni Vigna. Mobile Agent Security[C]. LNCS 1419,1998, 1-14.
  • 10朱向华,万燕,孙永强.移动代理系统的安全机制[J].计算机工程,2001,27(1):137-138. 被引量:16

二级参考文献5

  • 1[1]Vitek J, Serrano M, Thanos D. Security and Communication in Mobile Object Systems. Mobile Object Systems-Towards the Programmable Internet. MOS'96, 1996-07
  • 2[2]Goldberg I.Wagner D, Thomas R et al. A Secure Environment for Untrusted Helper Application. In Proceedings of the 6th Usenix Security Symposium,San Jose,ca., 1996-07
  • 3[3]Lindholm T, Yellin F. The Java Virtual Machine Specification. Adison-Wesley,1997
  • 4[4]Necula G C, Lee P. Safe, Untrusted Agents Using Proof-carrying Code. Submitted for an LNCS Special Volume on Mobile Agent Security, 1997-10
  • 5[5]Wahbe R, Lucco S, Anderson T E et al. Efficient Software-based Fault Isolation. In Proc. 14th ACM Symp. on Operating System Principles,1993

共引文献15

同被引文献86

  • 1[4]PULIAFITO A, TOMARCHIO O. Using mobile agent to implement flexible management strategies [ J ]. Computer Communication, 2000, 23 (8): 708 - 719.
  • 2[5]BIESZCZAD A, PAGUREK B, WHITE T. Mobile agents for network management [ J ]. IEEE Communication Surveys, 1998,1 (1):2-9.
  • 3[7]REISER H, Vogt G. Security requirements for management systems using mobile agents [A]. Proceedings of the Fifth IEEE Symposium on Computers & Communications (ISCC 2000) [C]. Antibes(France): 2000. 160- 165.
  • 4[8]STALLINGS W. SNMP, SNMPv2 and RMON: Practical Network Management [M]. Reading(MA): Addison-Wesley, 1999.
  • 5[9]YANG Jia-hai, REN Xian-kun, WANG Pei-yu. Principles and realization technology of network management [ M ].Beijing(China): Tsinghua University Press, 2000.
  • 6[11]BORSELIUS N. Mobile agent security [J]. Electronics & Communication Engineering Journal, 2002, 14 (5): 211- 218.
  • 7[12]CORRADI A, MONTANA RI R, STEFANELLI C. Security issues in mobile agent technology [ A]. Proceedings of 7th IEEE Workshop on Future Trends of Distributed Computing Systems (FTDCS 99)[C]. Cape Town, South Africa, 1999. 3 - 8.
  • 8[13]BIERMAN E, CLOTE E. Classification of Malicious Host Threats in Mobile Agent Computing [A]. Proceedings of the 2002 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists on Enablement Through Technology [ C ]. Port Elizabeth(South Africa): 2002. 141 - 148.
  • 9[14]WILLELM U G, STAAMANN S M, BUTTYAN L. A pessimistic approach to trust in mobile agent platforms [J].IEEE Intemet Computing, 2000, 4(5): 40 - 48.
  • 10[15]CHEN Zhi-qun. Java Card (tm) Technology for Smart Cards: Architecture and Programmer's (The Java Series)[M]. Reading(MA): Addison-Wesley, 2000.

引证文献7

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部