期刊文献+

基于Java的Agents的安全问题(英文)

Security Issues for Java-Based Agents
下载PDF
导出
摘要 在分布式系统中,随着计算机网络的普及,编程方式也发生了变化,即由远程调用方式转变为远距编程方式,这种变化可减少网络流量、提高系统性能.软件agents适合完成这项任务.使用agents能带来多种好处,且不利方面很少,这包括附加的安全问题.新的组件系统能改进Java套装软件系统的多个缺陷,使编程者能获得更多的对动态连接的控制权,实现Java-agent的自主安全.agent模型中出现的一般安全问题,可通过一种实用的方法加以解决. With the popularization of computer networks,there has been a shift proposed in distributed system programming from the remote procedure call to the remote programming paradigm,to decrease network traffic and improve performance.Software agents could be used to accomplish this task.The use of agents has several advantages and a few disadvantages,including added security issues.In order to implement autonomous security of Java agent,the author presents a new module system for Java that improves upon many of the deficiencies of the Java package system and gives the programmer more control over dynamic linking.Next,the author develops a general agent model and discusses general security issues in that model.Finally,the author proposes a practical solution that addresses some of those security issues.
作者 刘传才
出处 《吉首大学学报(自然科学版)》 CAS 2003年第1期26-36,共11页 Journal of Jishou University(Natural Sciences Edition)
基金 SupportedbyChinese 1973Programme(G19980 3 0 60 0 ) NaturalScienceFoundationofFujianProvince(F0 0 0 13 )
关键词 计算机网络 网络安全 JAVA AGENTS 分布式系统 动态连接 自主安全 远距编程 远程调用 software agents remote procedure call dynamic linking autonomous security
  • 相关文献

参考文献34

  • 1[1]BAUER LUJO, APPLE ADREW W, FELTEN EDWARD W. Mechanisms for Secure Modular Programming in Java[ R]. Technical Report: TR - 603 - 99, Department of Computer Science, Princeton University, 1999.
  • 2[2]GOSLING JAMES,JOY BILL,STEELE GUY.The Java Language Specification,the Java Series[M]. Reading, Massachusetts:Addison - Wesley, 1996.
  • 3[3]MILNER ROBIN,TOFTE MADS,HARPER ROBERT.The Definition of Standard ML[M] .Cambridge,MA:MIT Press,1990.
  • 4[4]BLUME MATTHIAS, APPLE ANDREW. Hierarchical Modularity[ M ]. ACM Transactions on Programming Language and Systems,1999.
  • 5[5]CARDELLI LUCA. Program Fragments, Linking, and Modularization[ A]. 24th ACM SIGPLAN- SIGACT Symposium on the Principle of Programming Languages [C]. Baltimore, 1997. 266 - 277.
  • 6[6]LINDHOLM TIM,YELLIN FRANK.The Java Virtual Machine Specification[M] .Reading,Massachusetts:Addison-Wesley, 1997.
  • 7[7]LEROY XAVIER, ROUAIX FRANCOIS. Security Properties of Typed Applets [ A ]. Conference Record of POPL ' 98: The 25 ACM SIGPLAN- SIGACT Symposium on Principles of Programming Languages[ C]. San Diego, California, 1998. 391 -403.
  • 8[8]SUN MICROSYSTEMS. Java Core Reflection[ EB/OL]. http://www. java. sun. com/products/jdk/1. 2/docs/guide/reflection/spec/java - reflection. doc. html, 1998.
  • 9[9]GRAFINKEL, SIMSON, GENE SPAFFORD. Practical UNIX & Intemet Security [ R]. O' Reilly & Associates, Inc., 1996.
  • 10[10]KAUFMAN CHARLIE, PERMAN RADIA, SPECINER MIKE. Network Security Private Communication in a Pubhc Worlds[ M ]. Englewood Cliffs, NJ:Prentice Hall, 1995.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部