Trusted Software Behavior Monitoring Model Based on Agent

被引:0
|
作者
Li, Caimao [1 ]
Chen, Shaofan [1 ]
Wu, Hanwei [1 ]
Chen, Jing [1 ]
机构
[1] Hainan Univ, Coll Informat Sci & Technol, Haikou 570228, Peoples R China
关键词
modeling; monitoring; trusted software; agent; AOP;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper studies trusted model for software behavior monitoring Based on agent. First, it put forward a trust monitoring software behavior framework, then analyzed the dynamic proxy monitoring mechanism, built a dynamic proxy monitoring model based on AOP. Finally, this paper analyzed the monitoring ability to weave mechanism by AOP, and designed a weaving module of monitoring model based on AOP.
引用
收藏
页码:420 / 423
页数:4
相关论文
共 50 条
  • [1] Trusted Software Monitoring Research Based on Dynamic Proxy
    Li, Cai-mao
    Chen, Shao-fan
    Wu, Han-wei
    Chen, Jing
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGY (CNCT 2016), 2016, 54 : 791 - 797
  • [2] Trusted Software Construction Model Based on Trust Shell
    Tian, Junfeng
    Zhu, Ye
    [J]. NEW TRENDS AND APPLICATIONS OF COMPUTER-AIDED MATERIAL AND ENGINEERING, 2011, 186 : 251 - 255
  • [3] A Measurement Model for Trustworthy Software Based on Trusted Evidences
    Li, Yan
    Chen, Yixiang
    [J]. 2016 INTERNATIONAL SYMPOSIUM ON SYSTEM AND SOFTWARE RELIABILITY (ISSSR), 2016, : 20 - 24
  • [4] Trust Shell Based Constitution Model of Trusted Software
    Tian Junfeng
    Zhu Ye
    [J]. CHINA COMMUNICATIONS, 2011, 8 (04) : 11 - 22
  • [5] Hierarchical and Dynamic Trusted Evaluation Model Based on Agent
    Yang Xiaohui
    Zhou Xuehai
    Tian Junfeng
    [J]. PROCEEDINGS OF 2009 CONFERENCE ON COMMUNICATION FACULTY, 2009, : 312 - +
  • [6] Agent-based User-Profiling Model For Behavior Monitoring
    Ali, Ghulam
    Shaikh, Noor A.
    Shaikh, Zubair A.
    [J]. INTERNATIONAL CONFERENCE ON FUTURE NETWORKS, PROCEEDINGS, 2009, : 3 - 7
  • [7] Research on Trust Model Based on Behavior and Trusted Computing
    Gu Yue-sheng
    Chen Jun
    Wang Yan-rong
    [J]. PROGRESS IN MEASUREMENT AND TESTING, PTS 1 AND 2, 2010, 108-111 : 1259 - 1263
  • [8] Software analysis model based on agent
    Huang, Zhen
    Gu, Yuqing
    [J]. Jisuanji Gongcheng/Computer Engineering, 2002, 28 (01):
  • [9] The Trust Management Model of Trusted Software
    Wu Jin
    Liao Yongjian
    Nie Xuyun
    Liu Mengjuan
    [J]. 2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 3, PROCEEDINGS, 2009, : 534 - 537
  • [10] Agent Trusted Authentication Model Based on Star-style and TPM
    Fan, Chao
    Zhao, Rong-Cai
    Shan, Zheng
    Zhao, Bing-Lin
    [J]. 2015 International Conference on Software Engineering and Information System (SEIS 2015), 2015, : 215 - 225