期刊文献+

基于Java的可移动软件Agent系统安全性 被引量:3

Security of a Java-Based Software System for Mobile Agents
在线阅读 下载PDF
导出
摘要 移动Agent具有迁移计算的特性 ,安全性成为构造运行环境的重要组成部分。分析了Mo bileAgent环境下安全问题的构成和特点 ,并根据它提出了对系统的要求和对所开发的MobileAgent系统JMSAS中的解决方案。将安全模型建立于访问控制模型之上 ,并根据MobileAgent的特点加入了第三方认证体制。在安全机制的设计中围绕Agent的两种状态———运行态和迁移态进行讨论 ,对主要部件和协议做了详细的介绍。 Security is an important part in the construction of the software that runs the environment during the calculation of the itinerary of Mobile Agents. The formation and characteristics of the security for the environment under a Mobile Agent are analyzed. This analysis of the system is used to find out the requirements and the solutions to develop security for JMSAS in a Mobile Agent. The security model is built before the visit control model. In the meantime, the third party confirmation system is introduced according to the characteristics of the Mobile Agent. Both running state and the itinerary state of the Agent are to be considered during the design of its security mechanism.
出处 《武汉汽车工业大学学报》 CAS 2000年第5期37-41,共5页
关键词 移动Agent软件 系统安全性 第三方认证 JAVA Mobile Agent system security the third party confirmation
  • 相关文献

参考文献1

  • 1[1] Hyacinth S N. Software Agents: An Overview[J]. Knowledge Engineering Review, 1996,11(3):205-208

同被引文献9

  • 1David M. Chess. Security Issues in Mobile Code Systems. Mobile Agents and Security(Giovanni Vignaed). Lecture Notes in Computer Science. New YORK:Spring-Verlag:1-14,1998
  • 2George C. Necula,Peter Lee. Untrusted Agents Using Proof Carrying Code. Mobile Agents and Security (Giovanni Vignaed ).Lecture Notes in Computer Science. New YORK :Spring-Verlag:61-91,1998
  • 3Shimshon Berkovits,Joshua D. Guttman,Vipin Swarup. Authentication for Mobile Agents, Mobile Agents and Security (Giovanni Vigna ed ). Lecture Notes in Computer Science. New YORK:Spring-Verlag: 114-136,1998
  • 4Tao Shu ,Cao Yang and Yin Jianhua. Distributed Network Management Based on Mobile Agents. Proceedings of TOOLS (Techonology of Objects-Oriented Language and Systems)Asia'99 &OOT (Object-Oriented Technology) China'99, Nanjing, China.October 1999
  • 5田国英.移动Agent体系结构及迁移实现.http:∥netchool.yesky.com/34668544/159459.shtml
  • 6吕立,廉东本,李红雨.信息系统安全技术研究[J].小型微型计算机系统,1997,18(1):46-49. 被引量:5
  • 7谢良跃.数据仓库信息安全问题分析[J].山东电子,1999(3):6-7. 被引量:4
  • 8吴应良.管理信息系统的安全问题与对策研究[J].计算机应用研究,1999,16(11):22-25. 被引量:31
  • 9徐宁,曹阳,郝曼.基于移动Agent的分布式网管系统安全认证机制[J].武汉大学学报(自然科学版),2001,47(1):71-74. 被引量:2

引证文献3

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部