Risk Assessment for Migrating Workflow Based on Danger Theory

被引:0
|
作者
Wei, Xiaojun [1 ]
Han, Fangxi [1 ]
Wang, Xiaolin [1 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Jinan 250100, Peoples R China
关键词
threats; risk assessment; danger theory; migrating workflow;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The protection for mobile agent is a problem in the study of migrating workflow system. In this paper, we propose a new approach to protect mobile agent in another perspective. We protect mobile agents against the threats from maclious hosts by implementing risk assessment. The system uses the danger signal trigger mechanism to deal with threats. And the system gets the risk value by implementing risk assessment we proposed before mobile agent resides on a host. The result of experiment shows that our method is feasibility and accuracy.
引用
收藏
页码:2234 / 2238
页数:5
相关论文
共 50 条
  • [1] Danger Theory Based Model for Network Security Risk Assessment
    Sun, Feixian
    SPORTS MATERIALS, MODELLING AND SIMULATION, 2011, 187 : 148 - 154
  • [2] Information Security Risk Assessment Based on Artificial Immune Danger Theory
    Zhuang, Yi
    Li, Xiaorong
    Xu, Bin
    Zhou, Bo
    2009 FOURTH INTERNATIONAL MULTI-CONFERENCE ON COMPUTING IN THE GLOBAL INFORMATION TECHNOLOGY (ICCGI 2009), 2009, : 169 - 174
  • [3] Danger theory based network risk evaluation model
    School of Computer Science, Sichuan University, Chengdu 610054, China
    不详
    Dianzi Keji Diaxue Xuebao, 2007, 6 (1198-1201):
  • [4] Danger Theory Based Risk Evaluation Model for Smurf Attacks
    Sun, Feixian
    MATERIALS, MECHATRONICS AND AUTOMATION, PTS 1-3, 2011, 467-469 : 515 - 521
  • [5] Migrating workflow organization and execution based on navigation model
    Yang, Gong-Ping
    Zeng, Guang-Zhou
    Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2006, 36 (05): : 819 - 823
  • [6] Achieving DDoS Resiliency in a Software Defined Network by Intelligent Risk Assessment Based on Neural Networks and Danger Theory
    Mihai-Gabriel, Ionita
    Victor-Valeriu, Patriciu
    2014 IEEE 15TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS (CINTI), 2014, : 319 - 324
  • [7] The study of service composition based on ontology in migrating workflow system
    Zhu, Qing
    Wang, Xiaolin
    Zeng, Guangzhou
    2ND INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2010), VOLS 1 AND 2, 2010, : 474 - 477
  • [8] Risk, danger, and trust: refining the relational theory of risk
    Christoffersen, Mikkel Gabriel
    JOURNAL OF RISK RESEARCH, 2018, 21 (10) : 1233 - 1247
  • [9] A Perception Model of Spam Risk Assessment Inspired by Danger Theory of Artificial Immune Systems
    Zainal, Kamahazira
    Jali, Mohd Zalisham
    INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND COMPUTATIONAL INTELLIGENCE (ICCSCI 2015), 2015, 59 : 152 - 161
  • [10] The Method Based on Q-Learning Path Planning in Migrating Workflow
    Xiao, Song
    Wang, Xiao-lin
    PROCEEDINGS 2013 INTERNATIONAL CONFERENCE ON MECHATRONIC SCIENCES, ELECTRIC ENGINEERING AND COMPUTER (MEC), 2013, : 2204 - 2208