Trusted Software Behavior Monitoring Model Based on Agent

被引:0
|
作者
Li, Caimao [1 ]
Chen, Shaofan [1 ]
Wu, Hanwei [1 ]
Chen, Jing [1 ]
机构
[1] Hainan Univ, Coll Informat Sci & Technol, Haikou 570228, Peoples R China
关键词
modeling; monitoring; trusted software; agent; AOP;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper studies trusted model for software behavior monitoring Based on agent. First, it put forward a trust monitoring software behavior framework, then analyzed the dynamic proxy monitoring mechanism, built a dynamic proxy monitoring model based on AOP. Finally, this paper analyzed the monitoring ability to weave mechanism by AOP, and designed a weaving module of monitoring model based on AOP.
引用
收藏
页码:420 / 423
页数:4
相关论文
共 50 条
  • [41] The Trusted Platform Agent
    Cabiddu, Giovanni
    Cesena, Emanuele
    Sassu, Roberto
    Vernizzi, Davide
    Ramunno, Gianluca
    Lioy, Antonio
    [J]. IEEE SOFTWARE, 2011, 28 (02) : 35 - 41
  • [42] PISAGOR: a proactive software agent for monitoring interactions
    Özgür Kafalı
    Pınar Yolum
    [J]. Knowledge and Information Systems, 2016, 47 : 215 - 239
  • [43] PISAGOR: a proactive software agent for monitoring interactions
    Kafali, Ozgur
    Yolum, Pinar
    [J]. KNOWLEDGE AND INFORMATION SYSTEMS, 2016, 47 (01) : 215 - 239
  • [44] Software Behavior detection model based on fuzzy matching
    Kong Weiguang
    [J]. Advanced Computer Technology, New Education, Proceedings, 2007, : 128 - 130
  • [45] An agent-based approach to rapid software evolution based on a domain model
    Glover, SJ
    Bennett, KH
    [J]. INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, PROCEEDINGS, 1996, : 228 - 237
  • [46] New access model and implementation of trusted network based on trusted certificate
    Wei, Da
    Jia, Xiang-Peng
    Wang, Jian
    Liu, Yan-Heng
    [J]. Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2010, 40 (02): : 496 - 500
  • [47] Mobile behavior trusted certification based on multivariate behavior sequences
    Zhao, Peihai
    Wang, Mimi
    [J]. NEUROCOMPUTING, 2021, 419 : 203 - 214
  • [48] The research of Trusted Computing based on the model of trusted Meta data of BSCM
    Zhong, Liu
    [J]. 2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 941 - 945
  • [49] A Robust Sequential Recommendation Model Based on Multiple Feedback Behavior Denoising and Trusted Neighbors
    Cai, Hongyun
    Meng, Jie
    Yuan, Shilin
    Ren, Jichao
    [J]. NEURAL PROCESSING LETTERS, 2024, 56 (01)
  • [50] Static Analysis-Based Behavior Model Building for Trusted Computing Dynamic Verification
    YU Fajiang1
    2. Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education
    [J]. Wuhan University Journal of Natural Sciences, 2010, 15 (03) : 195 - 200