Trusted Software Behavior Monitoring Model Based on Agent

被引:0
|
作者
Li, Caimao [1 ]
Chen, Shaofan [1 ]
Wu, Hanwei [1 ]
Chen, Jing [1 ]
机构
[1] Hainan Univ, Coll Informat Sci & Technol, Haikou 570228, Peoples R China
关键词
modeling; monitoring; trusted software; agent; AOP;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper studies trusted model for software behavior monitoring Based on agent. First, it put forward a trust monitoring software behavior framework, then analyzed the dynamic proxy monitoring mechanism, built a dynamic proxy monitoring model based on AOP. Finally, this paper analyzed the monitoring ability to weave mechanism by AOP, and designed a weaving module of monitoring model based on AOP.
引用
收藏
页码:420 / 423
页数:4
相关论文
共 50 条
  • [21] An agent-based model for biomorphic software systems
    Zeghida, Djamel
    Michel, Fabien
    Meslati, Djamel
    [J]. PROCEEDINGS OF 2012 INTERNATIONAL CONFERENCE ON COMPLEX SYSTEMS (ICCS12), 2012, : 166 - 171
  • [22] An OO-based design model of software agent
    Li, JX
    Mao, XJ
    Shu, Y
    [J]. PDCAT 2005: SIXTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2005, : 434 - 440
  • [23] A security based model for mobile agent software systems
    Xu, HP
    Zhang, ZG
    Shatz, SM
    [J]. INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2005, 15 (04) : 719 - 746
  • [24] A Trusted Remote Attestation Model based on Trusted Computing
    Yu, Yue
    Wang, Huaimin
    Liu, Bo
    Yin, Gang
    [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1504 - 1509
  • [25] The Meta-requirements Model Study for Trusted Software
    Tang, Zhongjun
    Liu, Shuqin
    [J]. 2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [26] Software Behavior Model Based on Functional Slicing
    Zhao, Binglin
    Wang, Yinhao
    Shan, Zheng
    Fan, Chao
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS RESEARCH AND MECHATRONICS ENGINEERING, 2015, 121 : 57 - 60
  • [27] Modeling Trusted Software
    Yang, Jie
    Li, Yi
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION, 2009, : 370 - 373
  • [28] Trusted behavior identification model for distributed node
    Lin, Yu
    Yu, Xuejun
    Glaubitt, Walther
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 37 (04) : 4621 - 4631
  • [29] Trusted Computing Dynamic Attestation by Using Static Analysis based Behavior Model
    Yu, Fajiang
    Tang, Xianglei
    Yu, Yue
    Li, Tong
    Yang, Tong
    [J]. 2011 NINTH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS WORKSHOPS (ISPAW), 2011, : 1 - 6
  • [30] METRIC BASED SOFTWARE PROJECT PERFORMANCE MONITORING MODEL
    Doraisamy, Mariayee
    Ibrahim, Suhaimi
    Mahrin, Mohd Naz'ri
    [J]. JURNAL TEKNOLOGI, 2016, 78 (12-3): : 51 - 67