Risk Assessment for Migrating Workflow Based on Danger Theory

被引:0
|
作者
Wei, Xiaojun [1 ]
Han, Fangxi [1 ]
Wang, Xiaolin [1 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Jinan 250100, Peoples R China
关键词
threats; risk assessment; danger theory; migrating workflow;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The protection for mobile agent is a problem in the study of migrating workflow system. In this paper, we propose a new approach to protect mobile agent in another perspective. We protect mobile agents against the threats from maclious hosts by implementing risk assessment. The system uses the danger signal trigger mechanism to deal with threats. And the system gets the risk value by implementing risk assessment we proposed before mobile agent resides on a host. The result of experiment shows that our method is feasibility and accuracy.
引用
收藏
页码:2234 / 2238
页数:5
相关论文
共 50 条
  • [21] Opportunities for migrating IP distribution into station workflow
    Fabiano, J
    Christofferson, F
    SMPTE MOTION IMAGING JOURNAL, 2002, 111 (11): : 519 - 524
  • [22] Opportunities for migrating IP distribution into station workflow
    Fabiano, Joe
    Christofferson, Floyd
    SMPTE Journal, 2002, 111 (11): : 519 - 524
  • [23] DANGER AHEAD: RISK ASSESSMENT AND THE FUTURE OF BAIL REFORM
    Koepke, John Logan
    Robinson, David G.
    WASHINGTON LAW REVIEW, 2018, 93 (04) : 1725 - 1807
  • [24] Study of Union Navigation in Migrating Workflow System
    Sui, Qingxiu
    Wang, Xiaolin
    2ND INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2010), VOLS 1 AND 2, 2010, : 11 - 14
  • [25] Goals Description with DLs in Migrating Workflow System
    Wu, Xiuguo
    Jiang, Tongtong
    2008 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL 3, PROCEEDINGS, 2008, : 285 - +
  • [26] Goals description and application in migrating workflow system
    Wu Xiuguo
    Zeng Guangzhou
    EXPERT SYSTEMS WITH APPLICATIONS, 2010, 37 (12) : 8027 - 8035
  • [27] A computer forensics model based on danger theory
    Peng, Lingxi
    Li, Zhengde
    Zeng, Jinquan
    Zhang, Jian
    Liu, Caiming
    Liang, ChunLin
    IITA 2007: WORKSHOP ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, PROCEEDINGS, 2007, : 87 - +
  • [28] Outbreak detection model based on danger theory
    Mohsin, Mohamad Farhan Mohamad
    Abu Bakar, Azuraliza
    Hamdan, Abdul Razak
    APPLIED SOFT COMPUTING, 2014, 24 : 612 - 622
  • [29] Rockbolts Detection Based on Immune Danger Theory
    Sun, Xiaoyun
    Zhao, Yang
    Zhang, Tianyuan
    Liu, Donghui
    2013 NINTH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION (ICNC), 2013, : 713 - 717
  • [30] RISK ASSESSMENT ON ECOSYSTEM BASED ON UNCERTAIN MEASUREMENT THEORY
    Shao, Jia
    Zhang, Qinli
    Peng, Xiuli
    Liu, Taoying
    FRESENIUS ENVIRONMENTAL BULLETIN, 2017, 26 (04): : 2884 - 2893