期刊文献+

一种基于异步执行机制的新型移动代理方案

A New Mobile Agent Scheme Based on Asynchronism Execution Mechanism
下载PDF
导出
摘要 移动代理是一种新兴的网络技术,它提供了一个新的计算方式,在网络分布式环境中有着极为重要的作用。随着移动软件混合性的增加,也伴随着对安全的威胁。保护移动代理的代码及数据免受窜扰已成为移动代理能正常运行的关键。传统的密码机制不能直接应用到移动代理环境,考虑到移动代理的动态性和智能性等特点,提出了一种基于异步执行机制的新型移动代理方案,以增强移动代理和其执行环境的安全可靠性。最后对其做了安全分析和性能分析。 Mobile agent technique,as a emerging Internet technology,offers a new computing paradigm.It plays an important role in distributed computer systems.As the sophistication of mobile software has increased over time.It is important to protect mobile agent both codes and data against being tempered. However the traditional cryptograph is unsuitable to be employed in these environments. Concerned the character of mobile agent such as the dynamic and intelligence,this paper present a new mobile agent scheme based on asynchronism execution mechanism in order to enhance the security and reliability of mobile agents and their environments. Analysis of security and performance is conducted.
出处 《南京邮电学院学报(自然科学版)》 2004年第1期82-85,94,共5页 Journal of Nanjing University of Posts and Telecommunications
基金 国家自然科学基金(60173037和70271050) 江苏省自然科学基金(BK2003105) 国家高科技"八六三"计划(2002AA776030) 江苏省计算机信息处理重点实验室基金资助项目
关键词 异步执行机制 移动代理 网络技术 安全可靠性 Digital signature Mobile agent Encryption Authentication
  • 相关文献

参考文献12

  • 1丁建国,柳惠琳,陈涵生,白英彩.移动Agent的一种安全认证机制[J].计算机工程,2001,27(2):74-75. 被引量:20
  • 2王常杰,张方国,王育民.Internet移动代理技术中的安全性研究[J].西安电子科技大学学报,2001,28(2):268-272. 被引量:15
  • 3DAVIES W, PRICE W L. Security for Computer Networks[M].Chichesfer: John Wiley & Sons, 1989.
  • 4DIFFER W, WIENER M J, Authentication and Authenticated Key Exchanges[J]. Disigns Codes and Cryptography, 1992, (2) : 107 - 125.
  • 5SCHNERLER B. Applied Cryptography-Protocols, Algorithms and Sources Code in C[M]. New York:Wiley & Sons Inc, 1994.
  • 6FENG D G, LIU B.Almost perfect nonlinear permutations[J].IEEE Electronics, 1994,30(3) :208 ~ 209.
  • 7SILVERMAN R D, WAGSTAFF S S. A practical analysis of the elliptic cave factoring algorithm[J]. Mathematics of computation, 1993,61 (4) :445 ~ 462.
  • 8SANDER T, TSCHUDIN C. Protecting Mobile Agents Against Malicious Host[ EB/OL]. http ://www. icsi. berkeley. edu/sander/publications.
  • 9BERKOVITS S, GUTIWIAN J D, SWARUP V. Authentication for Mobile .Agents[ A]. In: VIGNAL G. Mobile Agent and Security. [ C].Berlin: Springer-Verlag, 1998.
  • 10SWARUP V. Mobile Computations and Trust[ A]. In:4th Workshop on Mobile Object Systems :Secure Internet Mobile Computations, ECOOP'98[ C]. 1998.

二级参考文献8

  • 1[1]Harrison C G, Chess D M. Mobile Agent: Are They Good Idea?IBM Research Report,1995
  • 2[2]David K, Robert S G. Mobile Agents and the Future of the Internet. ACM Operating System Review, 1999-08:7-13
  • 3[3]Sander T, Christian F T. Mobile Agent and Security. Spriner Verlag Lecture Notes in Computer Science #1419, 1998-06
  • 4[4]Tripathi A R, Karnik N M. Protected Resource Access for Mobile Agent-based Distributed Computing. Proceedings of the 1998 ICPP Workshop on Wireless Networks and Mobile Computing.IEEE Computer Society, 1998-08: 144-153
  • 5[5]Greenberg M S, Byington L C, Harper D G. Mobile Agents and Security. IEEE Communications Magazine, 1998, 36(7): 76-85
  • 6Yi Xun,Proc Int IFIP/GI Working Conference TREC 98 NLCS Vol140 2,1998年,218页
  • 7Wang X F,The 11th Australian Joint Conference on Artificial Itelligence,1998年,1544卷,183页
  • 8胡予濮,肖国镇.公钥体制[N_(ac)/S_(te)]的安全性分析[J].西安电子科技大学学报,1999,26(5):661-662. 被引量:3

共引文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部