期刊文献+

分布式网络中智能代理的安全迁移机制 被引量:2

The Security Transition Mechanism of Intelligent Agents in Distributed Networks
下载PDF
导出
摘要 在许多特殊的分布式系统网络中,由于各节点的管理权限和职能的不同,网络各节点之间存在着严格的等级划分。针对智能代理在这种特殊分布式网络中传输时存在的安全问题,本文介绍了一种IA的安全迁移机制。该机制使用签名技术实现对节点的身份认证,使用3DES算法实现对传输数据的加密。该机制已由脚本语言Python编程实现。实践证明,它有效地保证了IA在迁移时的安全性。 In many special distributed networks, network nodes have been classified into different grades, according to the administration purview and functions. As for the security problem of intelligent agents' transfer in such distributed networks, this paper proposes a new security transition mechanism. Identity authentication is actualized by means of the signature technique, and data encryption is actualized by means of 3DES. The algorithm for the mechanism has been implemented by the script language Pyton, and the experimental results show that it is effective to keep the security of IA transition in distributed networks.
出处 《计算机工程与科学》 CSCD 北大核心 2009年第1期101-102,137,共3页 Computer Engineering & Science
关键词 智能代理 身份认证 分布式网络 IA迁移 intelligent agent identity authentication distributed network IA transition
  • 相关文献

参考文献7

二级参考文献55

  • 1W Lugmayr. Mobile code, agents, and Java. 2000. http://www. infosys, tuwien, ac. at/Research/Agents/homepage. html. 被引量:1
  • 2W Jansen, T Karygiannis. NIST special piblications 800-19:Mobile agent security. National Institute of Standards and Technology, Tech Rep: MD208999, 1999. 被引量:1
  • 3W Jansen. Countermeasures for mobile agent security. Computer Communications, 2000, 23(10): 1667--1677. 被引量:1
  • 4R Wahbe, S Lucco, T E Anderson et al. Efficient software-based fault isolation. In: Proc of the 14th ACM Symposium on Operating Systems Principles. New York: ACM Press, 1993.203--216. 被引量:1
  • 5J K Ousterhout. Scripting: Higher-level programming for the 21st century. IEEE Computer, 1998, 31(3) : 23--30. 被引量:1
  • 6G C Necula, P Lee. Safe kernel extensions without run-time checking. In: Proc of the 2nd Symposium on Operating System Design and Implementation. Berkeley: USENIX Association,1996. 229--243. 被引量:1
  • 7N Islam, R Anand, T Jaeger et al. A flexible security system for using intemet content. IEEE Software, 1997, 14(5): 52--59. 被引量:1
  • 8D Chess, B Grosof, C Harrison et al. Itinerant agents for mobile computing. IEEE Personal Communications, 1995, 2(5): 34--49. 被引量:1
  • 9W Farmer, J Guttman, V Swamp. Security for mobile agents:Authentication and state appraisal. In: Proc of the 4th European Symposiumon Research in Computer Sectudty. Rome: Springer-Verlag, 1996. 118--130. 被引量:1
  • 10R Sekar, C R Ramakrishnan. Model-carrying code (MCC): A new paradigm for mobile-code security. In: Proc of the 2001 Workshop on New Security Paradigms. New York: ACM Press,2001. 23--30. 被引量:1

共引文献133

同被引文献15

  • 1Stallings W. Cryptography and Network Security Principles and Pracfices.北京:电子工业出版社,2006. 被引量:1
  • 2Van Rossum (2 An Introduction to Python. Network Theory Ltd 2OO3,4. 被引量:1
  • 3http://pydes.sourceforge.net. 被引量:1
  • 4Li AN, Zhao ZM. Research and design of security mechanism for multi-grade Agent system. The llth IEEE International Conference on Communication Technology Proceedings. 2008.777-780. 被引量:1
  • 5John D Fernandez, Stephen Smith, Mario Garcia, et al. Computer forensics: A critical need in computer science programs [J]. Journal of Computing Sciences in Colleges, 2005, 20 (4) : 315-322. 被引量:1
  • 6Kannadiga P, Zulkernine M. DIDMA: A distributed intrusion detection system using mobile agents [C]. Software Engineering Artificial Intelligence Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Networks Sixth International Conference, Towson MD, the United states, 2005: 238-245. 被引量:1
  • 7Apache Software Foundation. Apache HTTP server project [EB/OL]. [2010-01-01]. http://httpd, apache, org/. 被引量:1
  • 8Jacobson V, Leres C, McCanne S. TCPDUMPDocumentation [EB/OL]. [2009-12-16]. Iawrence Berkeley Laboratory, Berkeley, CA. http://www, tcpdump, org/. 被引量:1
  • 9Roesch M, C-reen C. Snort users manual 2.8. 3 [EB/OL]. [2009-01-16]. http://www, snort, org/docs/snort_htmanuals/ htmanual_2832. 被引量:1
  • 10P, ellifemine F, Caire G, Poggi A, et al. JADE a white paper [EB/OL]. [2009-12-21]. http://exp, telecomitalialab, com. 被引量:1

引证文献2

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部