期刊文献+

参照CC标准的MAS安全框架研究及评价 被引量:1

Security Frame and Evaluation in Mobile Agent System
在线阅读 下载PDF
导出
摘要 本文提出了面向安全需求达到“足够安全”的定义,给出了一种Mobile Agent System主机和代理双向保护的安全框架模型,并给出了MAS安全性能评价思路与方法。
机构地区 军械工程学院
出处 《计算机系统应用》 2006年第1期40-43,共4页 Computer Systems & Applications
  • 相关文献

参考文献5

二级参考文献47

  • 1Sergio Loureiro,et al.Secure Data Collection with Updates[J].Electronic Commerce Research,2001,1(1-2):119-131.
  • 2A Young,M Yung.Sliding Encryption: A Cryptographic Tool for Mobile Agents[C].Fast Software Encryption'97,Springer-Verlag LNCS 1276,1997.230-241.
  • 3G Karjoth,et al.Protecting the Computation Results of Free-Roaming Agents[C].Proceedings of the 2nd International Workshop on Mobile Agents,Springer-Verlag LNCS 1477,1998.195-207.
  • 4S Haber,W S Stornetta.How to Time-Stamp a Digital Document[J].Journal of Cryptology,1991,3(2): 99-111.
  • 5Meadows,Catherine.Detecting Attacks on Mobile Agents[C].DARPA Workshop on Foundations for Secure Mobile Code Workshop,Monterey,CA,1997.64-65.
  • 6Oguz Kaan Onbilger,et al.A Distributed and Compromise-Tolerant Mobile Agent Protection Scheme[EB/OL].http://www.cise.ufl.edu/-nemo/papers/IAWTIC2001.htm,2001.
  • 7Bennet S Yee.A Sanctuary for Mobile Agents[C].Secure Internet Programming,Springer-Verlag LNCS 1603,1999.261-274.
  • 8V Roth.Secure Recording of Itineraries through Cooperating Agents[C].Proceedings of the ECOOP Workshop on Distributed Object Security and 4th Workshop on Mobile Object Systems: Secure Internet Mobile Computations,INRIA,France,1998.147-154.
  • 9Giovanni Vigna.Protecting Mobile Agents through Tracing[C].3rd Workshop on Mobile Object Systems,Finland,1997.12-25.
  • 10Ingrid Biehl,et al.Ensuring the Integrity of Agent-based Computations by Short Proofs[C].Proceedings of the 2nd International Workshop on Mobile Agents,Springer-Verlag LNCS 1477,1998.183-194.

共引文献13

同被引文献1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部