首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 78 毫秒
1.
移动Agent技术是一种分布式的网络计算模式,它将Agent的特点和移动的思想相结合,很好地解决了网络间任务分配与合作问题,使得一些网络技术的应用越来越广泛。但与此同时,移动Agent安全性问题的重要性也显得更为突出。本文在简要介绍移动Agent技术的基础上,分析了移动Agent的安全需求,重点讨论了移动Agent存在的安全性上的问题,并给出了针对移动Agent安全问题的解决方法。最后指出了未来移动agent安全性的研究方向和重点,只有从限制攻击者的行为和加强安全防护手段两方面入手,才能建立一个高效的安全体系,解决移动Agent的安全问题。  相似文献   

2.
基于移动Agent的智能搜索引擎的设计与实现   总被引:2,自引:0,他引:2  
刘翀  曹阳 《计算机工程》2002,28(10):105-107,110
在分析传统搜索引擎存在不足的基础上,提出了构建基于移动Agent的搜索引擎来解决系统的灵活性,有效性的新思路,文中分析了它的技术优势,设计实现了一个基于移动Agent的搜索引擎系统,最后指出了它的技术难点和应用前景。  相似文献   

3.
移动Agent框架的设计及其关键技术   总被引:5,自引:0,他引:5  
移动Agent技术具有良好的应用前景,应如何设计和实现一个移动Agent系统?该文设计了一个移动Agent框架,并详细给出实现:(1)异步迁移与移动用户支持;(2)迁移策略与并行处理;(3)通信管理与同步机制三个关键技术的解决方法。  相似文献   

4.
一个新的移动Agent的可靠通信算法   总被引:9,自引:1,他引:9  
移动Agent技术是近年来分布式计算领域中一项新兴的技术。其中有很多领域的研究尚不成熟,如Agent的可靠通信。Agent的可靠通信一直是Agent技术的一个难题,在现有的很多Agent系统中都未得到解决。比较了几种移动Agent可靠通信的算法,并提出了一种新的移动Agent的可靠通信算法。  相似文献   

5.
随着移动计算技术的发展,传统的电子商务开始进入移动电子商务时代,而在移动电子商务中引入移动Agent技术具有很多的优势,它可以提高电子商务工作的效率,加快移动电子商务的普及。在分析移动Agent系统的基础上,重点介绍基于移动Agent的移动电子商务功能结构和移动Agent的迁移实现。提出几种移动电子商务的安全技术和移动电子商务中引入移动Agent时的问题。  相似文献   

6.
网格计算中基于移动Agent的资源发现机制   总被引:3,自引:0,他引:3  
网格计算中资源发现是一种相当关键的技术,为了更有效地发现并组织资源以满足应用程序的需要,分析了现有两种主要的资源发现技术,在LDAP(Light Directory Access Protocol)目录服务技术的基础上,结合移动Agent技术,提出了一种基于移动Agent的资源发现机制。详细介绍它的总体框架、工作机制,并给出了性能分析。  相似文献   

7.
近年来,随着网络应用的普及和发展,网络技术的相关技术和应用也是专家学所关心研究探讨的课题。移动Agent更是其中一项非常具有潜力的技术。而移动Agent在网络上运作时,它所代表的身份是授予它权力的使用,它所携带的敏感资科必须受到保护;提供网络服务的主机,也必须确保自身系统和资源的安全和机密性。另外,不同的移动Agent之间的接触也可能成为泄密和破坏的原因,所以移动Agent的安全与否是这项技术能否实际应用的主要关键。  相似文献   

8.
为了解决异构数据库的数据集成和共享问题,提出了一个基于移动Agent和XML的异构数据库集成模型:采用虚拟法和XML技术,建立了全局数据集成框架;同时,采用移动Agent技术,解决了局部数据库数据智能集成的问题,优化了查询处理模块,有效地提高了数据库的查询效率.  相似文献   

9.
Internet最为广泛的应用就是由Web服务器提供的WWW服务,如果能将Web服务器构造为一个能够容纳Agent的平台,将会极大地推动移动Agent在Internet上的应用。在保留现有Web服务器的情况下,如何来支持和应用移动Agent,这就涉及到移动Agent与Web服务器的集成问题。本文从应用的角度给出了一个基于中间件的集成框架,较好地解决了移动Agent与Web服务器的集成问题。  相似文献   

10.
一种基于MADP协议的移动Agent通信框架   总被引:2,自引:1,他引:2  
通信机制是移动Agent系统研究的基础。在分析各种通信方式的基础上,提出了一种基于MADP协议的移动Agent系统通信框架。介绍了MADP通信协议,对该通信框架进行了的分析,并详细阐述了每个部分的内部关系,讨论了相关实现技术。  相似文献   

11.
We are interested in providing an agent infrastructure for truly distributed control. Requirements include multiple language implementations, so that this agent host environment can exist in both real-time controllers and contain the ability to operate with external agent systems. Our first infrastructure, the Autonomous Cooperative System (ACS), accomplished these goals, but presented other issues. Although ACS has been successfully deployed on commercial controllers, new releases of controllers will cause complications in the evolution of the software and adoption of future functionality. We need to establish a formal integration procedure of the agent functionality with the controllers and to transform the underlying system into a fully integrated and open heterogeneous system. We use a shipboard automation example to demonstrate the use of the agent virtual machine. With this system, the shipboard automation system is designed as a distributed and survivable environment, thereby spreading intelligence throughout the controllers and not in central locations.  相似文献   

12.
We are interested in providing an agent infrastructure for truly distributed control. Requirements include multiple language implementations, so that this agent host environment can exist in both real-time controllers and contain the ability to operate with external agent systems. Our first infrastructure, the Autonomous Cooperative System (ACS), accomplished these goals, but presented other issues. Although ACS has been successfully deployed on commercial controllers, new releases of controllers will cause complications in the evolution of the software and adoption of future functionality. We need to establish a formal integration procedure of the agent functionality with the controllers and to transform the underlying system into a fully integrated and open heterogeneous system. We use a shipboard automation example to demonstrate the use of the agent virtual machine. With this system, the shipboard automation system is designed as a distributed and survivable environment, thereby spreading intelligence throughout the controllers and not in central locations.  相似文献   

13.
14.
Pervasive computing is an emerging technology that offers new possibilities to distributed computing and computer networking; it employs a wide variety of smart, ubiquitous devices throughout an individual's working and living environment. Mobile agents are software entities that can migrate between servers (mobile agent environments) of the network accomplishing various tasks on the behalf of their owners. The objective of this paper is to describe a test and prototyping environment for experimenting with mobile agents in pervasive environments. A prototype environment for a novel, proactive infrastructure is described for mobile agent assisted pervasive computing. In addition, a new message passing algorithm is provided for mobile agent connection establishment and management (CEMA). Simulation results show the performance of the proposed approach.  相似文献   

15.
基于Agent技术的虚拟组织集成框架IFVO   总被引:15,自引:0,他引:15  
虚拟组织正成为常规组织(或个人)间协同工作的重要形式,并要求集成化信息基础的支持。文中提出一个基于Agent技术的虚拟组织集成框架IFVO,它以面向活动分担的联合意向作为主要手段从3个方面:体系结构方式、Agent协作的语义互操作,支持集成化虚拟组织信息基础的开发和协调运作,IFVO将虚拟组织的信息基础封装和构造为可快速组合和拆卸的嵌套Agent联邦,从而能有效地支持虚拟组织的动态建立、运营过程的  相似文献   

16.
A Mobile Adhoc Network (MANET) is collection of mobile nodes and communicates using wireless network without having any fixed infrastructure. This paper proposes an algorithm used to allocate the resources for multimedia applications using mobile agent technology in MANET. In addition to that, it allocates the resources for hand-off applications and new applications.  相似文献   

17.
With the vigorous development of electronic commerce these years, many experts and scholars have devoted themselves to various fields of research and application. Of these fields, electronic contracting is a new research topic in great demand. In spite of its promise, electronic contracting involves the standardization of ontology and automation of negotiation, which renders the implementation of electronic contracting difficult. In view of the necessity of electronic contracting, we present a learning-enabled agent-based infrastructure and claim that it will be a solution to the problems encountered during the process of electronic contracting by a variety of evaluations. In this infrastructure, the applications of an agent are viewed as a set of application ontologies, each of which is a combination of a context ontology and a object ontology so that the negotiation context and automation of negotiation can be flexibly integrated in this infrastructure. The infrastructure enables the automation of electronic contracting through a general and automatic communication protocol and provides reusability by the componentization of agents. The infrastructure provides personalized multiattribute evaluation and proposal generation by a mechanism, which is a combination of neural networks and genetic algorithms, in order to enable the automatic negotiation ability at agents.  相似文献   

18.
The arrival of commodity hardware configurations with performance rivaling that offered by RISC workstations is resulting in important advances in the state of the art of building and running very large scalable clusters at “mass market” pricing levels. However, cluster middleware layers are still considered as static infrastructures which are not ready for evolution. In this paper, we claim that middleware layers based on both agent and Java technologies offer new opportunities to support clusters where services can be dynamically added, removed, and reconfigured. To support this claim, we present the Java management extensions, a new Java agent-based technology, and its application to implement two disjoint cluster management middleware services (a remote reboot service and a distributed infrastructure for collecting Log events) which share a unique agent-based infrastructure.  相似文献   

19.
移动代理目前广泛应用于分布式并行计算、网络信息搜索、电子商务等领域,但安全问题一直是阻碍其发展的重要原因。结合身份密码学知识和洋葱路由工作原理提出了一种新型的非交互式移动代理路径检测协议,检测过程中无需双方协商,既节省了网络带宽,又加快了加解密速度。基于身份的加密也避免了公钥基础设施中身份证书的复杂管理,提高了系统运作效率。  相似文献   

20.
Systems Network Architecture (SNA) is no longer a strictly hierarchical networking environment. The introduction of advanced peer-to-peer networking (APPN) provides for more flexibility: end user systems attaching to an SNA network are no longer controlled by a mainframe host. This new flexibility creates challenges for SNA/Management Services (SNA/MS), however, since the previous hierarchical relationship provided a vehicle for network management as well as network control. The SNA/MS architecture has been extended to meet the needs of this peer-to-peer environment, providing a management infrastructure which replaces the previous SSCP to PU relationship, and at the same time provides for much greater flexibility. This new infrastructure provides a mechanism for negotiating manager and agent (referred to as focal point and entry point in SNA/MS) roles between systems, and a transport technique for management services data which exploits advanced program-to-program communication (APPC).  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号