期刊文献+

基于生物免疫的迁移实例完整性检测 被引量:1

Integrity detection for migrating instance based on biology immune
下载PDF
导出
摘要 迁移实例的可迁移性为工作流管理系统带来了更多的安全问题。针对迁移工作流管理系统中迁移实例的完整性问题,基于生物免疫原理为迁移实例构造了一个免疫体以及基于免疫体的迁移实例完整性自检测系统。详细讨论了免疫体的构造、检测过程并对重要参数进行了分析。 The mobility of migrating instance brings more security risk to work/low management system. Aiming at the integrity problem of migrating instance, an immune entity for migrating instance based on biology immune theory was proposed. Its self-detecting mechanism for migrating instance integrity was given. Some key techniques, such as the structure of immune entity, the detecting process, and the analysis of important parameters, were discussed.
出处 《计算机应用》 CSCD 北大核心 2006年第7期1514-1516,1551,共4页 journal of Computer Applications
基金 国家自然科学基金资助项目(60573169)
关键词 迁移实例 安全 生物免疫 完整性检测 免疫体 migrating instance security biology immune integrity detection immune entity
  • 相关文献

参考文献11

  • 1曾广周,党妍.基于移动计算范型的迁移工作流研究[J].计算机学报,2003,26(10):1343-1349. 被引量:61
  • 2CICHOCKI C , RUSINKIEWICZ M . Migrating Workflows [ A ] .DOGAC A, ed. Workflow Management Systems and Interoperability[C]. Berlin, Heidelberg:Springer Verlag, 1998. 339-355.
  • 3HOHL F. Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts[ A]. Mobile Agents and Security[C].Springer Verlag, 1998, LNCS 1419. 92 - 113.
  • 4LOUREIRO S, MOLVA R, PANNETRAT A. Secure Data Collection with Updates[J]. Electronic Commerce Research, 2001, 1(1/2):119-131.
  • 5SANDER T, TSCHUDIN C. Protecting Mobile agents Against Malicious Hosts[ A]. Mobile Agents and Security[ C]. Springer Verlag,1998, LNCS 1419. 442-460.
  • 6RIORDAN J, SCHNEIER B. Environmental Key Generation towards Clueless Agents[ A]. Mobile Agents and Security[ C]. Springer Verlag, 1998, LNCS 1419. 15 -24.
  • 7苏成,殷兆麟.基于免疫Agent的网络安全模型[J].计算机工程与设计,2003,24(2):30-32. 被引量:6
  • 8王凤先,刘振鹏,李继民,常胜.一种仿生物免疫的计算机安全系统模型[J].小型微型计算机系统,2003,24(4):698-701. 被引量:18
  • 9FORREST S, PERELSON AS, ALLEN L, et al. Self-nonself discrimination in a computer[ A]. IEEE Computer Society Symposium on Research in Security and Privacy[ C].1994.202 -212.
  • 10D'HASELEER P. An Immunological Approach to Change Detection: Theoretical Results[ A]. IEEE Computer Security Foundations Workshop[C].1996.18 -26.

二级参考文献14

  • 1童竞亚.医学免疫学与微生物学(第三版)[M].北京:人民卫生出版社,1996.208.
  • 2姚坤 陈慎宝 孙邦华.医学免疫学[M].广州:中山大学出版社,1992..
  • 3Forrest S, Hofmeyr S A, Somayaji A. ComputerImmunology[J]. Communications of the ACM, 1997,40(10): 88-96.
  • 4Cichocki A, Rusinkiewicz M. Migrating workflows. In: Dogac A et al eds. Workflow Management Systems and Interoperability. Berlin: Heidelberg(Springer Verlag), 1998. 339~355.
  • 5Loke S W, Zaslavsky A. Towards distributed workflow enactment with itineraries and mobile agent management. In: Jiming L, Yiming Y eds. E-Commerce Agents. New York: Springer-Verlag, 2001. 283~294.
  • 6Young-Ho Suh et al. Design of a mobile agent-based workflow management system. In: Proceedings of the 3rd International Workshop, MATA 2001, Montreal, Canada, 2001.93~102.
  • 7Lu Xin, Jiang Hao. Application of mobile agent technology in distributed workflow management system. Journal of Southeast University (Natural Science Edition), 2002, 32 (1) : 119 ~ 123(in Chinese).
  • 8WFMC Workflow Management Coalition Terminology and Glossary. Workflow Management Coalition, Brussels: Technical Report WFMC-TC-1011, 1996.
  • 9Zhu Qi-Liang, Zheng Bin. CORBA Principles and Its Application. Beijing: Beijing University of Posts and Telecommunications Press, 2001(in Chinese).
  • 10Wang Hong, Zeng Guang-Zhou, Lin Shou-Xun. The strong migration of agent based on java. Mini-Micro Systems, 2002, 23(2) :250~252(in Chinese).

共引文献82

同被引文献2

  • 1Forrest S, Perelson A S, Allen L, et al. Self-nonself Discrimination in a Compater[C]//Proc. of the 1994 IEEE Symposium on Research in Security' and Privacy Los Alamitos, USA: [s. n.], 1994: 202-212.
  • 2曾广周,党妍.基于移动计算范型的迁移工作流研究[J].计算机学报,2003,26(10):1343-1349. 被引量:61

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部