A Mobile-agent Security Architecture

被引:0
|
作者
Lin, DeShu [1 ]
Huang, TingLei [1 ]
机构
[1] Guilin Univ Elect Sci & Technol, Comp & Control Coll, Guangxi, Peoples R China
关键词
mobile agent; security; cryptography; reputation;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Increasingly widespread application of mobile agent, mobile agent system's security is a prominent problem to be solved, mobile agent's security question is critical. In this paper, based on cryptography, computer network security, mobile agent security architecture at the same time gives the practical methods and suggested ways can be used in other new security measures. The core problem is how to use measures to ensure the security of mobile agent communication and mobile agent execution environment of security, at the same time ensure that mobile agent can be applied more widely.
引用
收藏
页码:477 / 480
页数:4
相关论文
共 50 条
  • [1] The Research on Mobile-agent Security
    WANG Ru chuan
    [J]. The Journal of China Universities of Posts and Telecommunications, 2002, (03) : 47 - 52
  • [2] Agent server architecture for the Ajanta mobile-agent system
    Karnik, NM
    Tripathi, AR
    [J]. INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS I-IV, PROCEEDINGS, 1998, : 66 - 73
  • [3] A MOBILE-AGENT BASED ARCHITECTURE FOR VIRTUAL ENTERPRISES
    Brito, Luis
    Neves, Jose
    Moura, Francisco
    [J]. E-BUSINESS AND VIRTUAL ENTERPRISES: MANAGING BUSINESS-TO-BUSINESS COOPERATION, 2001, 56 : 167 - 174
  • [4] A mobile-agent based distributed dynamic μFirewall architecture
    Xian, F
    Jin, H
    Liu, K
    Han, ZF
    [J]. NINTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, PROCEEDINGS, 2002, : 431 - 436
  • [5] Robustness and security in a mobile-agent based network monitoring system
    Tripathi, A
    Koka, M
    Karanth, S
    Osipkov, I
    Talkad, H
    Ahmed, T
    Johnson, D
    Dier, S
    [J]. INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING, PROCEEDINGS, 2004, : 320 - 321
  • [6] Mobile-Agent's Self-Reliant Host Security Examination
    Irwan
    Langi, Armein Z. R.
    Husni, Emir
    [J]. 2015 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY SYSTEMS AND INNOVATION (ICITSI), 2015,
  • [7] A prototype mobile-agent application
    Liu, ML
    Liu, YJ
    [J]. COMPUTERS AND THEIR APPLICATIONS, 2000, : 154 - 157
  • [8] The architecture and security of a mobile communication agent
    Ge, Jinming
    [J]. WMSCI 2006: 10TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS, 2006, : 125 - 129
  • [9] A mobile-agent based distributed intelligent control system architecture for home automation
    Wu, QL
    Wang, FY
    Lin, YT
    [J]. 2001 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS, VOLS 1-5: E-SYSTEMS AND E-MAN FOR CYBERNETICS IN CYBERSPACE, 2002, : 1599 - 1605
  • [10] Java-Based Mobile-Agent Systems in the Real World: Security Highlights
    University of West Bohemia, Department of Computer Science and Engineering, Pilsen, Czech Republic
    [J]. 1600, 151-159 (2005):