期刊文献+

一种保障移动智能体系统的安全模型

intelligent mobile agent system oriented security model
下载PDF
导出
摘要 基于移动智能体的应用技术需要率先解决系统的基本安全问题,以支持其发展与成熟。鉴于传统的被动防御安全策略不能适应移动智能体技术应用的发展需要,提出了一种保障移动智能体系统安全的安全模型。按模型实现的原型系统能够主动识别并实时响应攻击行为。该系统还可利用端口映射的机制迷惑攻击者,起到代理服务器型防火墙的实际功效,这是对移动智能体系统安全解决方案的积极探索。 It is necessary to solving firstly the basic security problem of sytem for supporting its developing and maturing based on the application technology of intelligent mobile agent. Since the traditional passive security techniques can not suit the developing demand of intelligent mobile agent in technique application, a security model ensuring the system security of intelligent mobile agent is presented. The mobile based on prototype system can identify actively and react to attack in real-time. The proposed model also (equipped) with the function that can bewilder attackers through port mapping mechanism completing the practical effect just like a proxy server/firewall. It is an actively exploitation for solution of the intelligent mobile agent in application security risks.
作者 李锋 冯珊
出处 《系统工程与电子技术》 EI CSCD 北大核心 2004年第2期234-236,272,共4页 Systems Engineering and Electronics
基金 国防预研基金资助课题(51404020301JW0513)
关键词 移动智能体 安全模型 系统安全 安全策略 攻击识别 网络安全 mobile agent security model system security
  • 相关文献

参考文献3

二级参考文献12

  • 1[1]Vitek J, Serrano M, Thanos D. Security and Communication in Mobile Object Systems. Mobile Object Systems-Towards the Programmable Internet. MOS'96, 1996-07
  • 2[2]Goldberg I.Wagner D, Thomas R et al. A Secure Environment for Untrusted Helper Application. In Proceedings of the 6th Usenix Security Symposium,San Jose,ca., 1996-07
  • 3[3]Lindholm T, Yellin F. The Java Virtual Machine Specification. Adison-Wesley,1997
  • 4[4]Necula G C, Lee P. Safe, Untrusted Agents Using Proof-carrying Code. Submitted for an LNCS Special Volume on Mobile Agent Security, 1997-10
  • 5[5]Wahbe R, Lucco S, Anderson T E et al. Efficient Software-based Fault Isolation. In Proc. 14th ACM Symp. on Operating System Principles,1993
  • 6[1]Gray R S.Agent TCL: A Flexible and Secure Mobile-agent System.Proc.Fourth Annual TCL/TK Workshop(TCL 96),1996
  • 7[2]Tardo J,Valente L.Mobile Agent Security and Telescript.Proc,IEEE cOMPcON 96,IEEE Computer Society Press,Los Alamitos,Calif,1996
  • 8[3]Lange D B,Oshinma M.Java Agent APl: Programming and Deploying Aglets with Java.Addison-Wesley,1997
  • 9[4]Venners B.The Architecture of Aglets.JavaWorld.http://www.javaworld.com/javaworld/jw-04-hood.html,1997
  • 10刘燕,郭学理,梁意文,肖岚.深入理解和应用Linux防火墙[J].计算机工程与应用,2000,36(1):121-123. 被引量:5

共引文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部