期刊文献+
共找到892篇文章
< 1 2 45 >
每页显示 20 50 100
Incentive mechanism analysis of information security outsourcing based on principal-agent model
1
作者 熊强 仲伟俊 梅姝娥 《Journal of Southeast University(English Edition)》 EI CAS 2014年第1期113-117,共5页
In order to solve principal-agent problems caused by interest inconformity and information asymmetry during information security outsourcing, it is necessary to design a reasonable incentive mechanism to promote clien... In order to solve principal-agent problems caused by interest inconformity and information asymmetry during information security outsourcing, it is necessary to design a reasonable incentive mechanism to promote client enterprises to complete outsourcing service actively. The incentive mechanism model of information security outsourcing is designed based on the principal-agent theory. Through analyzing the factors such as enterprise information assets value, invasion probability, information security environment, the agent cost coefficient and agency risk preference degree how to impact on the incentive mechanism, conclusions show that an enterprise information assets value and invasion probability have a positive influence on the fixed fee and the compensation coefficient; while information security environment, the agent cost coefficient and agency risk preference degree have a negative influence on the compensation coefficient. Therefore, the principal enterprises should reasonably design the fixed fee and the compensation coefficient to encourage information security outsourcing agency enterprises to the full extent. 展开更多
关键词 principal agent information security outsourcing incentive mechanism
下载PDF
Application of mobile scanning agent in the network security
2
作者 闵君 冯珊 +1 位作者 唐超 梅纲 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2004年第3期371-376,共6页
To enhance the security of network systems, puts forward a kind of software agent is put forward, which has the induction ability of network frameworks and the ability of behavior independence. It is mobile scanning a... To enhance the security of network systems, puts forward a kind of software agent is put forward, which has the induction ability of network frameworks and the ability of behavior independence. It is mobile scanning agent. More attentions is paid to expound how to design and realize mobile scanning agent. Besides, it is also explained the programs of mobile scanning agent system. In the end, it expects mobile scanning agent. 展开更多
关键词 agent network security IMMUNITY agent transfer protocol
下载PDF
A Multi-Agent Immunology Model for Security Computer 被引量:5
3
作者 Liang Yi wen, Li Huan, Kang Li shan, Dong Hong bin College of Computer Science, Wuhan University, Wuhan 430072, China 《Wuhan University Journal of Natural Sciences》 CAS 2001年第Z1期486-490,共5页
This paper presents a computer immunology model for computer security, whose main components are defined as idea of Multi Agent. It introduces the natural immune system on the principle, discusses the idea and chara... This paper presents a computer immunology model for computer security, whose main components are defined as idea of Multi Agent. It introduces the natural immune system on the principle, discusses the idea and characteristics of Multi Agent. It gives a system model, and describes the structure and function of each agent. Also, the communication method between agents is described. 展开更多
关键词 computer immunology multi agent computer security
下载PDF
Towards a Comprehensive Security Framework of Cloud Data Storage Based on Multi Agent System Architecture 被引量:3
4
作者 Amir Mohamed Talib Rodziah Atan +1 位作者 Rusli Abdullah Masrah Azrifah Azmi Murad 《Journal of Information Security》 2012年第4期295-306,共12页
The tremendous growth of the cloud computing environments requires new architecture for security services. Cloud computing is the utilization of many servers/data centers or cloud data storages (CDSs) housed in many d... The tremendous growth of the cloud computing environments requires new architecture for security services. Cloud computing is the utilization of many servers/data centers or cloud data storages (CDSs) housed in many different locations and interconnected by high speed networks. CDS, like any other emerging technology, is experiencing growing pains. It is immature, it is fragmented and it lacks standardization. Although security issues are delaying its fast adoption, cloud computing is an unstoppable force and we need to provide security mechanisms to ensure its secure adoption. In this paper a comprehensive security framework based on Multi-Agent System (MAS) architecture for CDS to facilitate confidentiality, correctness assurance, availability and integrity of users' data in the cloud is proposed. Our security framework consists of two main layers as agent layer and CDS layer. Our propose MAS architecture includes main five types of agents: Cloud Service Provider Agent (CSPA), Cloud Data Confidentiality Agent (CDConA), Cloud Data Correctness Agent (CDCorA), Cloud Data Availability Agent (CDAA) and Cloud Data Integrity Agent (CDIA). In order to verify our proposed security framework based on MAS architecture, pilot study is conducted using a questionnaire survey. Rasch Methodology is used to analyze the pilot data. Item reliability is found to be poor and a few respondents and items are identified as misfits with distorted measurements. As a result, some problematic questions are revised and some predictably easy questions are excluded from the questionnaire. A prototype of the system is implemented using Java. To simulate the agents, oracle database packages and triggers are used to implement agent functions and oracle jobs are utilized to create agents. 展开更多
关键词 CLOUD COMPUTING MULTI-agent System CLOUD Data STORAGE security Framework CLOUD Service PROVIDER
下载PDF
Design on PKI-Based Anonymous Mobile Agent Security in E-Commerce
5
作者 MENG Xiangsong HAN Fengwu 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1907-1910,共4页
The security of mobile agent directly decides its usage width in e-commerce. Especially, to protect users' private information is becoming more important now and future. So an anonymous mobile agent security mechanis... The security of mobile agent directly decides its usage width in e-commerce. Especially, to protect users' private information is becoming more important now and future. So an anonymous mobile agent security mechanism with the secure authentication infrastructure based on PKI (public key infrastructure) is proposed in the paper. The multi-agent system is programmed by java language and every agent must register itself in CA (certificate authority) before working in the net and express his legit identity which is temptly produced and used only once. The CA ensures the legal of all agents' identity which take part in communicaiton or trade. And every user agent identity only is used once which makes other agents cannot decipher users' private information. The security mechanism of the multi-agent system implements anonymity, integrity, data confidentiality of mobile agent based on the MH(multiple hop) integrity protection regard to PKI limit. 展开更多
关键词 mobile agent PKI ANONYMITY e-commerce security
下载PDF
Wireless Application Protocol for Potential Threats to Mobile Agent Network Security
6
作者 M. Indra Sena Reddy K. Subba Reddy +1 位作者 P. J. Bhatt Rajeev Chetwani 《Journal of Electronic Science and Technology》 CAS 2012年第3期215-219,共5页
The wireless application protocol (WAP) protocol is now the leading standard for information services on wireless terminals like digital mobile phones. By the use of WAP, wireless devices, like mobile phones, are po... The wireless application protocol (WAP) protocol is now the leading standard for information services on wireless terminals like digital mobile phones. By the use of WAP, wireless devices, like mobile phones, are possibly infected with virus and worms. Though up to now there is no such attack, as the usage of script languages increases, there is a chance of malicious code injection. This paper discusses the threats with current WAP protocol, and how changes in the protocol and the increase in its usage will enable entry of real viruses. Future threat scenarios are presented along with suggestions to avoid these problems. 展开更多
关键词 Mobile agent security threats wireless application protocol.
下载PDF
Wireless Network Security: The Mobile Agent Approach
7
作者 Olatunde Abiona Adeniran Oluwaranti +4 位作者 Ayodeji Oluwatope Surura Bello Clement Onime Mistura Sanni Lawrence Kehinde 《International Journal of Communications, Network and System Sciences》 2013年第10期443-450,共8页
The broadcast nature of wireless network makes traditional link-layer attacks readily available to anyone within the range of the network. User authentication is best safeguard against the risk of unauthorized access ... The broadcast nature of wireless network makes traditional link-layer attacks readily available to anyone within the range of the network. User authentication is best safeguard against the risk of unauthorized access to the wireless networks. The present 802.1× authentication scheme has some flaws, making mutual authentication impossible and open to man-in-the-middle attacks. These characteristics make traditional cryptographic mechanism provide weak security for the wireless environment. We have proposed the use of mobile agents to provide dependable Internet services delivery to users, this will guarantee secure authentication in wireless networks and we examine the feasibility of our solution and propose a model for wireless network security. 展开更多
关键词 WIRELESS Network security MOBILE agent AUTHENTICATION
下载PDF
Research on agent security and its application
8
作者 XIE Ying-gang WANG Zhi-liang ZHANG Qing DANG Hui-jian 《通讯和计算机(中英文版)》 2007年第3期38-43,51,共7页
关键词 密码学 移动代理系统 安全性能 保密鉴定 保密通讯
下载PDF
Multi-Agent Network Intrusion Active Defense Model Based on Immune Theory 被引量:2
9
作者 LIU Sunjun LI Tao WANG Diangang HU Xiaoqing XU Chun 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期167-171,共5页
Inspired by the immune theory and multi-agent systems, an immune multi-agent active defense model for network intrusion is established. The concept of immune agent is introduced, and its running mechanism is establish... Inspired by the immune theory and multi-agent systems, an immune multi-agent active defense model for network intrusion is established. The concept of immune agent is introduced, and its running mechanism is established. The method, which uses antibody concentration to quantitatively describe the degree of intrusion danger, is presented. This model implements the multi-layer and distributed active defense mechanism for network intrusion. The experiment results show that this model is a good solution to the network security defense. 展开更多
关键词 artificial immune system intrusion detection system multi-agent system network security
下载PDF
Agricultural Supply Chain Traceability System Based on Multi-Agent System 被引量:3
10
作者 CHEN Hong-lin 《Asian Agricultural Research》 2011年第10期42-45,49,共5页
In order to overcome defects in existing ASCTS(Agricultural Supply Chain Traceability System,a new traceability system based on Multi-Agent System(MAS) is put forward.By qualitative method,I analyze problems of applic... In order to overcome defects in existing ASCTS(Agricultural Supply Chain Traceability System,a new traceability system based on Multi-Agent System(MAS) is put forward.By qualitative method,I analyze problems of application of Agent technology in tracing quality of agricultural products.Physical model is built for this system and structure of traceability system is determined.Finally,algorithm is presented for major entities.From analysis of algorithm,it is proved that this system has some reference value in improving breadth and depth of product traceability. 展开更多
关键词 Multi-agent System Agricultural product supply chain ASCTS Agricultural product security China
下载PDF
A Distributed Multicast Encryption and Management Solutions Based on Security Agent
11
作者 Ping Zhang Liang Zhou 《信息工程期刊(中英文版)》 2014年第5期132-137,共6页
关键词 加密方法 安全代理 分布式 管理 安全组播 多播 通信安全 企业内部网
下载PDF
Multi-agent cooperative intrusion response in mobile adhoc networks 被引量:6
12
作者 Yi Ping Zou Futai +1 位作者 Jiang Xinghao Li Jianhua 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第4期785-794,共10页
The nature of adhoc networks makes them vulnerable to security attacks. Many security technologies such as intrusion prevention and intrusion detection are passive in response to intrusions in that their countermea- s... The nature of adhoc networks makes them vulnerable to security attacks. Many security technologies such as intrusion prevention and intrusion detection are passive in response to intrusions in that their countermea- sures are only to protect the networks, and there is no automated network-wide counteraction against detected intrusions, the architecture of cooperation intrusion response based multi-agent is propose. The architecture is composed of mobile agents. Monitor agent resides on every node and monitors its neighbor nodes. Decision agent collects information from monitor nodes and detects an intrusion by security policies. When an intruder is found in the architecture, the block agents will get to the neighbor nodes of the intruder and form the mobile firewall to isolate the intruder. In the end, we evaluate it by simulation. 展开更多
关键词 computer networks security mobile agent mobile adhoc networks intrusion detection intrusion response
下载PDF
Performance Study of Distributed Multi-Agent Intrusion Detection System
13
作者 YIN Yong ZHOU Zu-de LIU Quan LI Fang-min LI Zhong-nan 《Computer Aided Drafting,Design and Manufacturing》 2005年第2期38-43,共6页
Traditional Intrusion Detection System (IDS) based on hosts or networks no longer meets the security requirements in today's network environment due to the increasing complexity and distributivity. A multi-agent di... Traditional Intrusion Detection System (IDS) based on hosts or networks no longer meets the security requirements in today's network environment due to the increasing complexity and distributivity. A multi-agent distributed IDS model, enhanced with a method of computing its statistical values of performance is presented. This model can accomplish not only distributed information collection, but also distributed intrusion detection and real-time reaction. Owing to prompt reaction and openness, it can detect intrusion behavior of both known and unknown sources. According to preliminary tests, the accuracy ratio of intrusion detection is higher than 92% on the average. 展开更多
关键词 distributed intrusion detection system multi-agent intrusion detectionmethod information security
下载PDF
The Research on Mobile-agent Security 被引量:7
14
作者 WANG Ru chuan, ZHAO Xin ning (Department of Computer Science and Technology,Nanjing University of Posts and Telecommunications,Nanjing 210003, P.R.China) 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2002年第3期47-52,共6页
Mobile agent technology offers a new computing paradigm in which a program,in the form of a software agent, can suspend its execution in a host computer, transfer itself toanother agent - enabled host in the network ,... Mobile agent technology offers a new computing paradigm in which a program,in the form of a software agent, can suspend its execution in a host computer, transfer itself toanother agent - enabled host in the network , and resume execution of the new host. As thesophistication of mobile software has increased 'with the time, so have the associated threats tosecurity. This paper provides an overview of the range of threats facing the designers of mobileagent. The paper also identifies generic security objectives, and a range of measures for counteringthe identified threats. 展开更多
关键词 mobile agent security agent platform malicious platform
原文传递
Developing Check-Point Mechanism to Protect Mobile Agent Free-Roaming Against Untrusted Hosts
15
作者 Tarig Mohamed Ahmed 《Computers, Materials & Continua》 SCIE EI 2022年第8期3849-3862,共14页
Mobile Agent has many benefits over traditional distributed systems such as reducing latency,bandwidth,and costs.Mobile Agent Systems are not fully utilized due to security problems.This paper focuses on mobile agent ... Mobile Agent has many benefits over traditional distributed systems such as reducing latency,bandwidth,and costs.Mobile Agent Systems are not fully utilized due to security problems.This paper focuses on mobile agent protection against malicious hosts.A new security mechanism called Checkpoints has been proposed.Checkpoint Mechanism(CPM)aims to protect Mobile Agent against malicious hosts in case of Capturing and Integrity attacks.CPM assumes using a free-roaming mobility mechanism by Mobile agent systems.The main idea behind CPM is to generate multiple versions of Mobile Agent.The multiple version is used to recover Mobile Agent from Capturing and Integrity attacks by untrusted hosts.MA versions are kept in Recovery Host(RH).RH plays a key role in CPM by controlling and monitoring MAs’recovery processes.A prototype method has been used to prove the feasibility of CPM.The p https://dsr.kau.edu.sa/Default-305-ARrototype was implemented by using the.Net framework and C#.full discussion for several scenarios has been done to analyze the feasibility and performance for CPM.As found from this research,CPM has a strong ability to protect Mobile Agents from Capturing and Integrity attacks completely.In addition,there is no negative impact on the overall performance of the mobile agent system. 展开更多
关键词 Mobile agent security capturing integrity attacks
下载PDF
Research on Application of Mobile Agent Based on Immune Algorithms in Ad Hoc Network
16
作者 Qinggong Ma Bo Yang 《Journal of Computer and Communications》 2015年第10期31-35,共5页
Ad Hoc network is a kind of multi hop, self-organizing wireless network without center. Each node in network can be used as host as well as router and it can form any network topology through wireless connections. Bec... Ad Hoc network is a kind of multi hop, self-organizing wireless network without center. Each node in network can be used as host as well as router and it can form any network topology through wireless connections. Because of characteristics of itself, many new service items and application fields appear;meanwhile, it is also faced with many new security threats. Using immune agent can perceive the change of network node and make corresponding decision behavior, find the misbehavior nodes in the network as soon as possible and reduce the network attack and improve the immune competence of network. 展开更多
关键词 IMMUNE NETWORK Mobile agent Ad HOC NETWORK security
下载PDF
General Study of Mobile Agent Based Intrusion Detection System (IDS)
17
作者 Chandrakant Jain Aumreesh Kumar Saxena 《Journal of Computer and Communications》 2016年第4期93-98,共6页
The extensive access of network interaction has made present networks more responsive to earlier intrusions. In distributed network intrusions, there are many computing nodes that are assisted by intruders. The eviden... The extensive access of network interaction has made present networks more responsive to earlier intrusions. In distributed network intrusions, there are many computing nodes that are assisted by intruders. The evidence of intrusions is to be associated from all the held up nodes. From the last few years, mobile agent based technique in intrusion detection system (IDS) has been widely used to detect intrusion over distributed network. This paper presented survey of several existing mobile agent based intrusion detection system and comparative analysis report between them. Furthermore we have focused on each attribute of analysis, for example technique (NIDS, HIDS or Hybrid), behavior layer, detection techniques for analysis, uses of mobile agent and technology used by existing IDS, strength and issues. Their strengths and issues are situational wherever appropriate. We have observed that some of the existing techniques are used in IDS which causes low detection rate, behavior layers like TCP connection for packet capturing which is most important activity in NIDS and response time (technology execution time) with memory consumption by mobile agent as major issues. 展开更多
关键词 Intrusion Detection System Mobile agent INTRUSION Network ATTACK security
下载PDF
基于FNN的多Agent SCADA安全防御模型 被引量:2
18
作者 赵恒博 曹谢东 《微型机与应用》 2016年第7期9-11,21,共4页
作为ICS(Industrial Control System)的重要组成部分,SCADA(Supervisory Control and Data Acquisition)受到的恶意攻击与日俱增。为了充分确保其信息安全,可以选择多Agent技术来实现基于FNN(Factor Neuron Network)的安全防御方法,并... 作为ICS(Industrial Control System)的重要组成部分,SCADA(Supervisory Control and Data Acquisition)受到的恶意攻击与日俱增。为了充分确保其信息安全,可以选择多Agent技术来实现基于FNN(Factor Neuron Network)的安全防御方法,并最终建立起一个SCADA系统安全防御模型。该模型继承了多Agent技术与FNN的优点,配置方便,易于维护,可以实时更新以及在线扩展,具备良好的通用性与可塑性,从而克服了现有IDS(Intrusion Detection System)的诸多不足,有效保障SCADA安全可靠地运行。 展开更多
关键词 agent FNN 安全防御 SCADA
下载PDF
Secure Consensus Control for Multi-Agent Systems With Attacks and Communication Delays 被引量:14
19
作者 Yiming Wu Xiongxiong He 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2017年第1期136-142,共7页
This paper addresses the consensus problem for nonlinear multi-Agent systems suffering from attacks and communication delays. The network studied in this paper consists of two types of agents, namely, loyal agents and... This paper addresses the consensus problem for nonlinear multi-Agent systems suffering from attacks and communication delays. The network studied in this paper consists of two types of agents, namely, loyal agents and attack agents. The loyal agents update their states based on delayed state information exchanged with their neighbors. Meanwhile, the attack agents can strategically send messages with wrong values, or collude with other attack agents to disrupt the correct operation of the system. We design a novel delay robust secure consensus DRSC algorithm according to the neighboring nodes U2BC delayed information. Convergence analysis of the system under the protocol designed is provided by using Lyapunov-Krasovskii stability theory and Barbalat-like argument approach. Finally, an example and simulation results are presented to demonstrate the effectiveness of the algorithm. © 2014 Chinese Association of Automation. 展开更多
关键词 Control systems Electrical engineering
下载PDF
The Study and Perspective of Mobile Agent Security 被引量:1
20
作者 MU Honga~1 WANG Ru-chuan~(1,2) WANG Hai-yan~11.Department of Computer Science and Technology,Nanjing University of Posts and Telecommunications,Nanjing 210003,P.R.China 2.State Key Laboratory of Information Security(Graduate School of Chinese Aeademy of Sciences),Beijing 100039,P.R.China 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2004年第4期48-53,共6页
Security is an important issue for the widespread deployment of applications based on software agent technolo-gy.It is generally agreed that without the proper countermeasures in place,use of agent-based applications ... Security is an important issue for the widespread deployment of applications based on software agent technolo-gy.It is generally agreed that without the proper countermeasures in place,use of agent-based applications will be severelyimpeded.So many projects have focused on the security issues of mobile agent and many mechanisms have been proposed tosolve the security problem.This paper discusses the security issues and the countermeasures.Then it points out some direc-tions for the research of the mobile agent security. 展开更多
关键词 mobile agent mobile code security CRYPTOGRAPHY
原文传递
上一页 1 2 45 下一页 到第
使用帮助 返回顶部