期刊文献+

移动智能体技术的安全机制研究 被引量:2

Research on Security Mechanism of Mobile Agent Technology
下载PDF
导出
摘要 移动智能体 (Mobile Agent)技术是分布式对象技术的扩展和加强 ,而是否具备高效合理的安全机制是其推广应用的关键 .本文从多方面讨论了移动智能体技术的安全问题 ,阐述了如何应用 Java安全机制解决移动智能体在驻留节点上的资源访问控制问题 。 Mobile Agent technology is more extensible and powerful than the traditional distribute object technology. But a proper and effective security mechanism is very important to the widespread deployment of applications based on Mobile Agent technology. This paper firstly inspects various aspects of Mobile Agent technologys possible security problems, then illustrates how to control mobile agents access to resources of host computer by using Java security mechanism, lastly implements a framework to enable Mobile Agent technologys secure communication and identity authentication by integrating with cryptography technology.
出处 《小型微型计算机系统》 CSCD 北大核心 2004年第4期493-496,共4页 Journal of Chinese Computer Systems
基金 国家自然科学基金重大项目 ( 90 10 40 3 0 )资助
关键词 移动智能体 安全机制 SANDBOX 密码技术 mobile agent security mechanism sandbox cryptography technology
  • 相关文献

参考文献6

  • 1[1]Fuggetta A, Picco G P and Vigna G. Understanding code mobility[J]. IEEE Transactions on Software Engineering, 1998, 24(5):342~361.
  • 2[2]Dejan S. Milojicic, Markus Breugst, Ingo Busse, MASIF: The OMG mobile agent system interoperability facility[A]. Kurt Rothermel, Fritz Hohl(Eds.): Mobile Agents, Second International Workshop[C]. MA'98, Stuttgart, Germany, September 1998, Proceedings. Lecture Notes in Computer Science, Vol. 1477, Springer, 1999, 50~67.
  • 3[3]Steven J. Fritzinger, Marianne Mueller, Sun Microsystem,Inc. Java security[EB/OL]. URL:http://java.sun.com/security/whitepaper.ps.
  • 4[4]Joann J. Ordille. When agents roam, who can you trust?[C]. Proceedings of the First Conference on Emerging Technologies and Applications in Communications, Portland, 1996, 188 ~ 191.
  • 5[5]Sander T and Tshudin C. Towards mobile cryptography[C].Proceedings of the IEEE Symposium on Security and Privacy, California, U.S.A, 1998, 215~224.
  • 6[6]Necula G and Lee P. Safe kernel extensions without run-time checking[C]. Proceedings of the 2nd Symposium on Operating System Design and Implementation (OSDI '96), Seattle, Washington, USA, 1996,229~243.

同被引文献16

  • 1Balasubrannaniyan, Garcia-Fiernandez.JO,lsacoff D. etal.Jai Sundar B. et al. An architecture for intrusion detection using autonomous agents[C]. In 14th IEEE Computer Security Application Conference, Dec.1998.
  • 2KQML:http://www.cs.umbc.edu/kqml/,march 2003.
  • 3Feiertag R,Kahn C,Porras P et.al. A common intrusion specification language(CISL)[EB/OL]. http://seclab.cs.ucdavis.edu/cidf/cisl_current.txt.
  • 4Curry D,Debar H.Intrusion detection message exchange format data model and extensible markup language (XML) document type definition[EB/OL]. http://www.ietf.org/,March,2003.
  • 5Shiau J Y, Ratchev M, Valtchanov G. Distributed collaborative design and manufacturability assessment for extended enterprise in XML-based agent system[C]. In:process of IEEE 9th International Workshops 14-10 June 2000,260-265.
  • 6Deitel H M, Deitel P J et al.XML how to program[M].Beijing:Tsinghua University Press 2000.
  • 7Kaariboga[EB/OL]. http://www.projectory.de/kaariboga/index.html.march 2003.
  • 8PHAM V A, KARMOUCH A. Mobile software agents: An overview[J]. IEEE Communications Magazine, 1998, 36(7): 26-37.
  • 9GREENBERG M S, BYINGTON L C, HARPER D G. Mobile agents and security [J]. IEEE Communications Magazine, 1998, 36(7): 76-85.
  • 10TARDO J, VALENTE L. Mobile agent security and telescript[C]//In: Proceedings of COMPCON Spring '96. Santa Clara: IEEE Computer Society press, 1996.

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部