In mobile cloud computing,trust is a very important parameter in mobile cloud computing security because data storage and data processing are performed remotely in the cloud.Aiming at the security and trust management...In mobile cloud computing,trust is a very important parameter in mobile cloud computing security because data storage and data processing are performed remotely in the cloud.Aiming at the security and trust management of mobile agent system in mobile cloud computing environment,the Human Trust Mechanism(HTM)is used to study the subjective trust formation,trust propagation and trust evolution law,and the subjective trust dynamic management algorithm(MASTM)is proposed.Based on the interaction experience between the mobile agent and the execution host and the third-party recommendation information to collect the basic trust data,the public trust host selection algorithm is given.The isolated malicious host algorithm and the integrated trust degree calculation algorithm realize the function of selecting the trusted cluster and isolating the malicious host,so as to enhance the security interaction between the mobile agent and the host.Given algorithm simulation and verification were carried out to prove its feasibility and effectiveness.展开更多
Claimed as the next generation programming paradigm, mobile agent technology has attracted extensive interests in recent years. However, up to now, limited research efforts have been devoted to the performance study o...Claimed as the next generation programming paradigm, mobile agent technology has attracted extensive interests in recent years. However, up to now, limited research efforts have been devoted to the performance study of mobile agent system and most of these researches focus on agent behavior analysis resulting in that models are hard to apply to mobile agent systems. To bridge the gap, a new performance evaluation model derived from operation mechanisms of mobile agent platforms is proposed. Details are discussed for the design of companion simulation software, which can provide the system performance such as response time of platform to mobile agent. Further investigation is followed on the determination of model parameters. Finally comparison is made between the model-based simulation results and measurement-based real performance of mobile agent systems. The results show that the proposed model and designed software are effective in evaluating performance characteristics of mobile agent systems. The proposed approach can also be considered as the basis of performance analysis for large systems composed of multiple mobile agent platforms.展开更多
This paper analyzes the reasons for the formation of security problems in mobile agent systems, and analyzes and compares the security mechanisms and security technologies of existing mobile agent systems from the per...This paper analyzes the reasons for the formation of security problems in mobile agent systems, and analyzes and compares the security mechanisms and security technologies of existing mobile agent systems from the perspective of blocking attacks. On this basis, the host protection mobile agent protection technology is selected, and a method to enhance the security protection of mobile agents (referred to as IEOP method) is proposed. The method first encrypts the mobile agent code using the encryption function, and then encapsulates the encrypted mobile agent with the improved EOP protocol IEOP, and then traces the suspicious execution result. Experiments show that using this method can block most malicious attacks on mobile agents, and can protect the integrity and confidentiality of mobile agents, but the increment of mobile agent tour time is not large.展开更多
In this paper, we employ genetic algorithms to solve the migration problem (MP). We propose a new encoding scheme to represent trees, which is composed of two parts: the pre-ordered traversal sequence of tree vertices...In this paper, we employ genetic algorithms to solve the migration problem (MP). We propose a new encoding scheme to represent trees, which is composed of two parts: the pre-ordered traversal sequence of tree vertices and the children number sequence of corresponding tree vertices. The proposed encoding scheme has the advantages of simplicity for encoding and decoding, ease for GA operations, and better equilibrium between exploration and exploitation. It is also adaptive in that, with few restrictions on the length of code, it can be freely lengthened or shortened according to the characteristics of the problem space. Furthermore, the encoding scheme is highly applicable to the degree-constrained minimum spanning tree problem because it also contains the degree information of each node. The simulation results demonstrate the higher performance of our algorithm, with fast convergence to the optima or sub-optima on various problem sizes. Comparing with the binary string encoding of vertices, when the problem size is large, our algorithm runs remarkably faster with comparable search capability. Key words distributed information retrieval - mobile agents - migration problem - genetic algorithms CLC number TP 301. 6 Foundation item: Supported by the National Natural Science Foundation of China (90104005), the Natural Science Foundation of Hubei Province and the Hong Kong Polytechnic University under the grant G-YD63Biography: He Yan-xiang (1952-), male, Professor, research direction: distributed and parallel processing, multi-agent systems, data mining and e-business.展开更多
Mobile agents provide a new method for the distributed computation. This paper presents the advantages of using mobile agents in a distributed virtual environment (DVE) system, and describes the architecture of hetero...Mobile agents provide a new method for the distributed computation. This paper presents the advantages of using mobile agents in a distributed virtual environment (DVE) system, and describes the architecture of heterogeneous computer's distributed virtual environment system (HCWES) designed to populate some mobile agents as well as stationary agents. Finally, the paper introduces how heterogeneous computer network communication is to be realized.展开更多
Mobile Network technology has been being the research focus during the 1990’s. The middleware technology is imported for the sake of running distributed transaction smoothly. In this paper, a mobile agent based middl...Mobile Network technology has been being the research focus during the 1990’s. The middleware technology is imported for the sake of running distributed transaction smoothly. In this paper, a mobile agent based middleware high efficiency mobile electronic business oriented middleware (HEMEBOM) is designed and implemented based on the requirement and background of collaborative electronic business. Its architecture, elements and excellent properties are mainly focused. Then high efficiency mobile electronic business system μMcommerce is built using HEMEBOM.展开更多
Current workflow management systems usually adopt the existing technologies such as TCP/IP-based Web technologies and CORBA as well to fulfill the bottom communications. Very often it has been considered only from a t...Current workflow management systems usually adopt the existing technologies such as TCP/IP-based Web technologies and CORBA as well to fulfill the bottom communications. Very often it has been considered only from a theoretical point of view, mainly for the lack of concrete possibilities to execute with elasticity. MAT (Mobile Agent Technology) represents a very attractive approach to the distributed control of computer networks and a valid alternative to the implementation of strategies for workflow system. This paper mainly focuses on improving the performance of workflow system by using MAT. Firstly, the performances of workflow systems based on both CORBA and mobile agent are summarized and analyzed; Secondly, the performance contrast is presented by introducing the mathematic model of each kind of data interaction process respectively. Last, a mobile agentbased workflow system named MAWMS is presented and described in detail. Key words workflow - Mobile Agent - Contract Net Protocol - CORBA - Web CLC number TP 393 Foundation item: Supported by the National Natural Science Foundation of China (60272024) and National Natural Science Foundation of Henan Province (0411014100)Biography: LI Jie, (1975-), male, lector, Ph. D., research direction: workflow, mobile agent, network management.展开更多
Few of the current approaches to achieve the integration of digital library system have considered the influence of network factors on quality of service for the integration system of digital libraries. For this reaso...Few of the current approaches to achieve the integration of digital library system have considered the influence of network factors on quality of service for the integration system of digital libraries. For this reason, a mobile agent based framework for integrating digital library system is proposed. Based on this framework, a prototype system is implemented and the key technique for it are described. Compared with the current approaches, using mobile agent technique to achieve the integration of digital library system can not only avoid transmitting a lot of data on the network, lower the dependence on network bandwidth for the system, but also improve the quality of service for the integration system of digital libraries in intermitted or unreliable network connection settings.展开更多
We analyze the deficiencies of current application systems, and discuss the key requirements of distributed Geographie Information serviee (GIS), We construct the distributed GIS on grid platform. Considering the fl...We analyze the deficiencies of current application systems, and discuss the key requirements of distributed Geographie Information serviee (GIS), We construct the distributed GIS on grid platform. Considering the flexibility and efficiency, we integrate the mobile agent technology into the system. We propose a new prototype system, the Geographic Information Grid System (GIGS) based on mobile agent. This system has flexible services and high performance, and improves the sharing of distributed resources. The service strategy of the system and the examples are also presented.展开更多
We propose a digital rights management (DRM) system based on mobile agent to protect the copyrights of content providers. In the system, the content provider creates a time limited blackbox out of an original agent ...We propose a digital rights management (DRM) system based on mobile agent to protect the copyrights of content providers. In the system, the content provider creates a time limited blackbox out of an original agent and dispatches it to the user end to enforce DRM functions. The blackbox is an agent that can resist the attacks from the malicious user in a certain time interval. Owing to digital rights redistribution support, the user whose rights belong to redistribution category can transfer his rights to other users. Moreover, by introducing public key infrastructure (PKI) and certificate authority (CA) role, the security of the session can be ensured. An analysis of system security and performance and a comparison with traditional DRM system is given.展开更多
The extensive access of network interaction has made present networks more responsive to earlier intrusions. In distributed network intrusions, there are many computing nodes that are assisted by intruders. The eviden...The extensive access of network interaction has made present networks more responsive to earlier intrusions. In distributed network intrusions, there are many computing nodes that are assisted by intruders. The evidence of intrusions is to be associated from all the held up nodes. From the last few years, mobile agent based technique in intrusion detection system (IDS) has been widely used to detect intrusion over distributed network. This paper presented survey of several existing mobile agent based intrusion detection system and comparative analysis report between them. Furthermore we have focused on each attribute of analysis, for example technique (NIDS, HIDS or Hybrid), behavior layer, detection techniques for analysis, uses of mobile agent and technology used by existing IDS, strength and issues. Their strengths and issues are situational wherever appropriate. We have observed that some of the existing techniques are used in IDS which causes low detection rate, behavior layers like TCP connection for packet capturing which is most important activity in NIDS and response time (technology execution time) with memory consumption by mobile agent as major issues.展开更多
The control problem of a class of parabolic distributed parameter systems (DPSs) is investigated by using mobile agents with capabilities of sensing and actuating. The guidance strategies of mobile agents based on cov...The control problem of a class of parabolic distributed parameter systems (DPSs) is investigated by using mobile agents with capabilities of sensing and actuating. The guidance strategies of mobile agents based on coverage optimization methods are proposed to improve the control performance of the system and make the state norm of the system converge to zero faster. The coverage optimization problems are constructed based on the measurement of each agent. By solving the coverage optimization problems, the local optimal moving direction of each agent can be obtained. Then the gradient-based agent motion control laws are established. With the indicator function and the surface delta function, this method is generalized to n-dimensional space, and suitable for any sensing region with piecewise smooth boundaries. The stability and control performance of the system are analyzed. Numerical simulations show the effectiveness of the proposed methods.展开更多
The human immune system has the function of selfdiscern.It can identify the non-self antigen and clear it through the immune response automatically.So,human body has the power of resisting disease.The anti-spam system...The human immune system has the function of selfdiscern.It can identify the non-self antigen and clear it through the immune response automatically.So,human body has the power of resisting disease.The anti-spam system basing on immune system is proposed by using immune system′s theory,and it is introduced in the mail service of enterprise VPN.Regard VPN as the human body,the mobile agent is simulated the antibody because of its movable and intelligent,and the spam is simulated the antigen.It can clear the spam by using immune mechanism.This method is a new thinking of anti-spam mail.The advantage is overcoming the weakness on independence of traditional antispam system.展开更多
Mobile agent technology has drawn a tremendous amount of attention from researchers in distributed computing recently as it promises to provide an elegant and efficient way of solving complex distributed problems, as ...Mobile agent technology has drawn a tremendous amount of attention from researchers in distributed computing recently as it promises to provide an elegant and efficient way of solving complex distributed problems, as well as offering a new approach to human-computer-interaction. In mobile agent systems, the mobile agent travels autonomously from one computer to another within the agent enabled networks, executes itself in the agent execution environment, collects useful information and makes its own decision or behalf of its owner. This mobility nature of mobile agent demands its unique name in the whole network otherwise it gets lost or conflicts with other mobile agent having same name. This paper proposes a naming scheme which promises a unique name for a mobile agent within that network. Key words mobile agent - mobile agent platform - naming scheme展开更多
In networked mobile commerce network transactions,trust is the prerequisite and key to a smooth transaction.The measurement of trust between entities involves factors such as transaction amount,transaction time,person...In networked mobile commerce network transactions,trust is the prerequisite and key to a smooth transaction.The measurement of trust between entities involves factors such as transaction amount,transaction time,personal income of consumer entities and their risk attitude towards trust,etc.,so it is difficult to accurately calculate quantitatively.In order to find out the essential characteristics of this trust relationship,based on the research background of mobile commerce in the mobile network environment,a dynamic trust mechanism is proposed through the research of trust in the mobile network environment,trust influencing factors and trust mechanism.The calculation model of mobile interactive services based on mobile service business transactions.The model calculates feedback credibility through feedback deviation and feedback robustness,and combines transaction context factors and trust mapping mechanism to judge the seller’s credibility.This model better reflects the degree of influence of subjective factors such as personal preferences and risk attitudes on trust calculations,And the sensitivity of trust algorithms and transaction attributes has been greatly improved.After a large number of experiments and theoretical analysis,this mechanism provides an effective explanation for solving the problem of network trust computing.and provides valuable new ideas for the study of secure transactions in the mobile Internet environment.展开更多
The technical characters of mobile agent (MA) originated in the distributional artificial intelligence domain is introduced. A network management construction based on agent (NMCA) is then proposed. The NMCA struc...The technical characters of mobile agent (MA) originated in the distributional artificial intelligence domain is introduced. A network management construction based on agent (NMCA) is then proposed. The NMCA structure features are elaborated in detail. A prototype design of NMCA is given by using the jKQML programming. The establishment of NMCA platform will be helpful to reduce the correspondence load of network management and improves the efficiency and the expansion ability of network management systems.展开更多
基金This work was supported by the National Natural Science Foundation of China(61772196,61472136)the Hunan Provincial Focus Social Science Fund(2016ZDB006)+2 种基金Hunan Provincial Social Science Achievement Review Committee results appraisal identification project(Xiang social assessment 2016JD05)Key Project of Hunan Provincial Social Science Achievement Review Committee(XSP 19ZD1005)The authors gratefully acknowledge the financial support provided by the Key Laboratory of Hunan Province for New Retail Virtual Reality Technology(2017TP1026).
文摘In mobile cloud computing,trust is a very important parameter in mobile cloud computing security because data storage and data processing are performed remotely in the cloud.Aiming at the security and trust management of mobile agent system in mobile cloud computing environment,the Human Trust Mechanism(HTM)is used to study the subjective trust formation,trust propagation and trust evolution law,and the subjective trust dynamic management algorithm(MASTM)is proposed.Based on the interaction experience between the mobile agent and the execution host and the third-party recommendation information to collect the basic trust data,the public trust host selection algorithm is given.The isolated malicious host algorithm and the integrated trust degree calculation algorithm realize the function of selecting the trusted cluster and isolating the malicious host,so as to enhance the security interaction between the mobile agent and the host.Given algorithm simulation and verification were carried out to prove its feasibility and effectiveness.
基金Supported by the National Natural Science Foundation of China (No.60072047) and Huawei Science and Technology Foundation (No.YJIN2003004)
文摘Claimed as the next generation programming paradigm, mobile agent technology has attracted extensive interests in recent years. However, up to now, limited research efforts have been devoted to the performance study of mobile agent system and most of these researches focus on agent behavior analysis resulting in that models are hard to apply to mobile agent systems. To bridge the gap, a new performance evaluation model derived from operation mechanisms of mobile agent platforms is proposed. Details are discussed for the design of companion simulation software, which can provide the system performance such as response time of platform to mobile agent. Further investigation is followed on the determination of model parameters. Finally comparison is made between the model-based simulation results and measurement-based real performance of mobile agent systems. The results show that the proposed model and designed software are effective in evaluating performance characteristics of mobile agent systems. The proposed approach can also be considered as the basis of performance analysis for large systems composed of multiple mobile agent platforms.
基金supported by the National Natural Science Foundation of China (61772196 61472136)+3 种基金the Hunan Provincial Focus Social Science Fund (2016ZDB006)Hunan Provincial Social Science Achievement Review Committee results appraisal identification project (Xiang social assessment 2016JD05)Key Project of Hunan Provincial Social Science Achievement Review Committee (XSP 19ZD1005)the financial support provided by the Key Laboratory of Hunan Province for New Retail Virtual Reality Technology (2017TP1026)
文摘This paper analyzes the reasons for the formation of security problems in mobile agent systems, and analyzes and compares the security mechanisms and security technologies of existing mobile agent systems from the perspective of blocking attacks. On this basis, the host protection mobile agent protection technology is selected, and a method to enhance the security protection of mobile agents (referred to as IEOP method) is proposed. The method first encrypts the mobile agent code using the encryption function, and then encapsulates the encrypted mobile agent with the improved EOP protocol IEOP, and then traces the suspicious execution result. Experiments show that using this method can block most malicious attacks on mobile agents, and can protect the integrity and confidentiality of mobile agents, but the increment of mobile agent tour time is not large.
文摘In this paper, we employ genetic algorithms to solve the migration problem (MP). We propose a new encoding scheme to represent trees, which is composed of two parts: the pre-ordered traversal sequence of tree vertices and the children number sequence of corresponding tree vertices. The proposed encoding scheme has the advantages of simplicity for encoding and decoding, ease for GA operations, and better equilibrium between exploration and exploitation. It is also adaptive in that, with few restrictions on the length of code, it can be freely lengthened or shortened according to the characteristics of the problem space. Furthermore, the encoding scheme is highly applicable to the degree-constrained minimum spanning tree problem because it also contains the degree information of each node. The simulation results demonstrate the higher performance of our algorithm, with fast convergence to the optima or sub-optima on various problem sizes. Comparing with the binary string encoding of vertices, when the problem size is large, our algorithm runs remarkably faster with comparable search capability. Key words distributed information retrieval - mobile agents - migration problem - genetic algorithms CLC number TP 301. 6 Foundation item: Supported by the National Natural Science Foundation of China (90104005), the Natural Science Foundation of Hubei Province and the Hong Kong Polytechnic University under the grant G-YD63Biography: He Yan-xiang (1952-), male, Professor, research direction: distributed and parallel processing, multi-agent systems, data mining and e-business.
文摘Mobile agents provide a new method for the distributed computation. This paper presents the advantages of using mobile agents in a distributed virtual environment (DVE) system, and describes the architecture of heterogeneous computer's distributed virtual environment system (HCWES) designed to populate some mobile agents as well as stationary agents. Finally, the paper introduces how heterogeneous computer network communication is to be realized.
文摘Mobile Network technology has been being the research focus during the 1990’s. The middleware technology is imported for the sake of running distributed transaction smoothly. In this paper, a mobile agent based middleware high efficiency mobile electronic business oriented middleware (HEMEBOM) is designed and implemented based on the requirement and background of collaborative electronic business. Its architecture, elements and excellent properties are mainly focused. Then high efficiency mobile electronic business system μMcommerce is built using HEMEBOM.
文摘Current workflow management systems usually adopt the existing technologies such as TCP/IP-based Web technologies and CORBA as well to fulfill the bottom communications. Very often it has been considered only from a theoretical point of view, mainly for the lack of concrete possibilities to execute with elasticity. MAT (Mobile Agent Technology) represents a very attractive approach to the distributed control of computer networks and a valid alternative to the implementation of strategies for workflow system. This paper mainly focuses on improving the performance of workflow system by using MAT. Firstly, the performances of workflow systems based on both CORBA and mobile agent are summarized and analyzed; Secondly, the performance contrast is presented by introducing the mathematic model of each kind of data interaction process respectively. Last, a mobile agentbased workflow system named MAWMS is presented and described in detail. Key words workflow - Mobile Agent - Contract Net Protocol - CORBA - Web CLC number TP 393 Foundation item: Supported by the National Natural Science Foundation of China (60272024) and National Natural Science Foundation of Henan Province (0411014100)Biography: LI Jie, (1975-), male, lector, Ph. D., research direction: workflow, mobile agent, network management.
文摘Few of the current approaches to achieve the integration of digital library system have considered the influence of network factors on quality of service for the integration system of digital libraries. For this reason, a mobile agent based framework for integrating digital library system is proposed. Based on this framework, a prototype system is implemented and the key technique for it are described. Compared with the current approaches, using mobile agent technique to achieve the integration of digital library system can not only avoid transmitting a lot of data on the network, lower the dependence on network bandwidth for the system, but also improve the quality of service for the integration system of digital libraries in intermitted or unreliable network connection settings.
基金Supported by the National Technology Research and De-velopment Programof China (863 Program,2002AA135340) and the Na-tional Key Basic Research and Development Program ( 973 Program,2004CB318206)
文摘We analyze the deficiencies of current application systems, and discuss the key requirements of distributed Geographie Information serviee (GIS), We construct the distributed GIS on grid platform. Considering the flexibility and efficiency, we integrate the mobile agent technology into the system. We propose a new prototype system, the Geographic Information Grid System (GIGS) based on mobile agent. This system has flexible services and high performance, and improves the sharing of distributed resources. The service strategy of the system and the examples are also presented.
基金the National Natural Science Foundation of China (60502024)the Electronic Development Fund of Ministry of Informa-tion Industry of China ([2007]329)the Natural Science Foundation of Hubei Province (2005ABA267)
文摘We propose a digital rights management (DRM) system based on mobile agent to protect the copyrights of content providers. In the system, the content provider creates a time limited blackbox out of an original agent and dispatches it to the user end to enforce DRM functions. The blackbox is an agent that can resist the attacks from the malicious user in a certain time interval. Owing to digital rights redistribution support, the user whose rights belong to redistribution category can transfer his rights to other users. Moreover, by introducing public key infrastructure (PKI) and certificate authority (CA) role, the security of the session can be ensured. An analysis of system security and performance and a comparison with traditional DRM system is given.
文摘The extensive access of network interaction has made present networks more responsive to earlier intrusions. In distributed network intrusions, there are many computing nodes that are assisted by intruders. The evidence of intrusions is to be associated from all the held up nodes. From the last few years, mobile agent based technique in intrusion detection system (IDS) has been widely used to detect intrusion over distributed network. This paper presented survey of several existing mobile agent based intrusion detection system and comparative analysis report between them. Furthermore we have focused on each attribute of analysis, for example technique (NIDS, HIDS or Hybrid), behavior layer, detection techniques for analysis, uses of mobile agent and technology used by existing IDS, strength and issues. Their strengths and issues are situational wherever appropriate. We have observed that some of the existing techniques are used in IDS which causes low detection rate, behavior layers like TCP connection for packet capturing which is most important activity in NIDS and response time (technology execution time) with memory consumption by mobile agent as major issues.
基金supported by the National Natural Science Foundation of China(61807016 61174021)+3 种基金the Fundamental Research Funds for the Central Universities(JUSRP115A28 JUSRP51733B)the 111 Projeet(B12018)the Postgraduate Innovation Project of Jiangsu Province(KYLX151170)
文摘The control problem of a class of parabolic distributed parameter systems (DPSs) is investigated by using mobile agents with capabilities of sensing and actuating. The guidance strategies of mobile agents based on coverage optimization methods are proposed to improve the control performance of the system and make the state norm of the system converge to zero faster. The coverage optimization problems are constructed based on the measurement of each agent. By solving the coverage optimization problems, the local optimal moving direction of each agent can be obtained. Then the gradient-based agent motion control laws are established. With the indicator function and the surface delta function, this method is generalized to n-dimensional space, and suitable for any sensing region with piecewise smooth boundaries. The stability and control performance of the system are analyzed. Numerical simulations show the effectiveness of the proposed methods.
文摘The human immune system has the function of selfdiscern.It can identify the non-self antigen and clear it through the immune response automatically.So,human body has the power of resisting disease.The anti-spam system basing on immune system is proposed by using immune system′s theory,and it is introduced in the mail service of enterprise VPN.Regard VPN as the human body,the mobile agent is simulated the antibody because of its movable and intelligent,and the spam is simulated the antigen.It can clear the spam by using immune mechanism.This method is a new thinking of anti-spam mail.The advantage is overcoming the weakness on independence of traditional antispam system.
文摘Mobile agent technology has drawn a tremendous amount of attention from researchers in distributed computing recently as it promises to provide an elegant and efficient way of solving complex distributed problems, as well as offering a new approach to human-computer-interaction. In mobile agent systems, the mobile agent travels autonomously from one computer to another within the agent enabled networks, executes itself in the agent execution environment, collects useful information and makes its own decision or behalf of its owner. This mobility nature of mobile agent demands its unique name in the whole network otherwise it gets lost or conflicts with other mobile agent having same name. This paper proposes a naming scheme which promises a unique name for a mobile agent within that network. Key words mobile agent - mobile agent platform - naming scheme
基金The author is very grateful for the financial support of the new retail virtual reality technology(2017TP1026)of the key laboratory in Hunan Province.
文摘In networked mobile commerce network transactions,trust is the prerequisite and key to a smooth transaction.The measurement of trust between entities involves factors such as transaction amount,transaction time,personal income of consumer entities and their risk attitude towards trust,etc.,so it is difficult to accurately calculate quantitatively.In order to find out the essential characteristics of this trust relationship,based on the research background of mobile commerce in the mobile network environment,a dynamic trust mechanism is proposed through the research of trust in the mobile network environment,trust influencing factors and trust mechanism.The calculation model of mobile interactive services based on mobile service business transactions.The model calculates feedback credibility through feedback deviation and feedback robustness,and combines transaction context factors and trust mapping mechanism to judge the seller’s credibility.This model better reflects the degree of influence of subjective factors such as personal preferences and risk attitudes on trust calculations,And the sensitivity of trust algorithms and transaction attributes has been greatly improved.After a large number of experiments and theoretical analysis,this mechanism provides an effective explanation for solving the problem of network trust computing.and provides valuable new ideas for the study of secure transactions in the mobile Internet environment.
文摘The technical characters of mobile agent (MA) originated in the distributional artificial intelligence domain is introduced. A network management construction based on agent (NMCA) is then proposed. The NMCA structure features are elaborated in detail. A prototype design of NMCA is given by using the jKQML programming. The establishment of NMCA platform will be helpful to reduce the correspondence load of network management and improves the efficiency and the expansion ability of network management systems.