期刊文献+

基于主从样式的移动代理安全模型的研究与实现

Research and Implement of Master-Slave Pattern Based Security Model for Mobile Agent
下载PDF
导出
摘要 1引言 随着Internet/Intranet/Extranet的迅速发展,网络的开放性、共享性和互联程度不断扩大,WWW被广泛用作信息发布、电子商务和各种娱乐的业务平台,对应于此,出现了许多新的网络技术,移动代理技术便是其中的一种. In the ages of current network technology, as a new technology, the emergence of mobile agent shows us a wider and wider application prospect in the fields of network technology, such as Network Management, Intelligence Information Retrieval and Electronic Commence and so on. The security is the essence of mobile agent technology. In this paper we analyze the security issues and survey some representative approaches to solve the problem in mobile agent systems. We focus on the issues about the agent's security and propose a master-slave design pattern based security model for mobile agent called SMAP (Secure Mobile Agent Platform). In the end we give an application example to show how to use these.
出处 《计算机科学》 CSCD 北大核心 2003年第12期62-65,共4页 Computer Science
基金 国家自然科学基金(60173037和70271050) 江苏省自然科学基金(BK2001123) 国家高技术八六三项目(2002AA776030) 江苏省计算机信息处理重点实验室基金(kjs03061)
关键词 计算机网络 主从样式 移动代理 安全模型 网络流量 Mobile agent, Security ,Design Pattern, Aglets
  • 相关文献

参考文献9

  • 1[1]Chess D. Security Issues in Mobile Code Systems. In:Giovanni Vigna(ED. ),Mobile Agent Security,LNCS 1419,Springer,1998.1~14
  • 2[2]Karnik N M, Tripathi A R. Design Issues in Mobile Agent Programming Systems. IEEE Concurrency,1998,6(3):52~61
  • 3[3]Wilhelm U G. et al. A Pessimistic Approach to Trust in Mobile Agent Platforms. IEEE COMPUTING ,September·October 2000.40~48
  • 4[4]Schaaf M, Maure F. Integrating Java and CORBA: A Programmer's Perspective. IEEE INTERNET COMPUTING,January-February 2001.72~78
  • 5[5]Wang X F, Yi X , Lam K Y. Secure Information Agent for Internet Trading [A]. 11th Australian Joint Conference on Artificial Intelligence'98, Vol 1 544 [C]. Brisban, Australia :Springer-Verlag Publishers, 1998. 183~ 194
  • 6[6]Farmer W M, Gutman J D, Swarup V. Security for Mobile Agents: Authentication and State Appraisal. In:Proc. Of the 4th European Syrup. On Research in Computer Security, Rome,Italy,LNCS No. 1146, Springer,1996. 118~130
  • 7[7]Eckel B. Thinking in Java, 2nd Edition, Release 11. PrenticeHall, 2000
  • 8[8]Pfleeger C P. Security in Computing, Second Edition. Upper Saddle River, New Jersey: Prentice Hall, 1997
  • 9[9]Schneier B. Applied Cryptography: Protocols, Algorithms, and Source Code in C. IS John Wiley & Sons, ISBN:0-47-111709-9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部