首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 109 毫秒
1.
将移动agent技术和主动网络思想融入下一代网络体系结构的研究中,提出了基于移动Agent的应用层主动网络的概念和框架模型。该模型主要从两个方面利用移动代理技术:一是主动包的封装;二是构造可迁移的移动代理环境MAE。并提供了对主动节点和网络服务动态定制的能力。  相似文献   

2.
刘苒苒 《湖北邮电技术》2007,20(6):40-43,46
针对Web服务安全问题中的访问控制,提出将移动Agent引入Web服务的安全访问控制模型,通过SRP协议对Web服务附加了一个独立的访问控制代理层,具有良好的通用性。实现了基于移动Agent的Web服务访问控制模型.并对控制流程进行了描述。  相似文献   

3.
方磊 《信息技术》2005,29(10):101-103
大多数网络管理系统都是通过基于一种管理者/代理者(Manager/Agent)模型的简单网络管理协议(SNMP)实现,它具有一定的局限性,并且在管理上缺乏足够的灵活性和智能性。移动代理具有移动性和智能性等特点,通过将其与网络管理技术相结合,能够大大提高网络管理系统的灵活性和可扩展性,使整个网络管理系统的性能得到很好的改善。  相似文献   

4.
刘苒苒 《信息通信》2007,20(6):40-43
针对web服务安全问题中的访问控制,提出将移动Agent引入web服务的安全访问控制模型,通过SRP协议对web服务附加了一个独立的访问控制代理层,具有良好的通用性.实现了基于移动Agent的web服务访问控制模型,并对控制流程进行了描述.  相似文献   

5.
将策略的思想引入移动代理的设计中,提出了基于策略的移动代理功能扩展的一种实现方法。重点阐述了如何将一个新的策略加载到移动代理中,从而实现移动代理在功能上的扩展。  相似文献   

6.
提出了一个通用的使用移动代理技术的实时监控模型框架。该模型是一个开放的系统模型。与特定的系统应用环境无关,可以作为一个部件集成在任何本地或远程移动代理平台上,为本地节点或某分布式环境提供其中移动代理资源使用情况的系统级和应用级信息,从而保证了系统对移动代理资源使用的管理。  相似文献   

7.
在虚拟专用网中,提出了一个基于移动代理技术的VPNAgent系统,分析了其体系结构并讨论了实现方法。该系统中的移动代理负责到客户端检测数据,为合法的数据加密和签名。然后护送数据包返回.向工作在防火墙处的静态代理出示签名。静态代理检测该签名,将通过检测的数据包除去签名部分.交与目的主机。实现了虚拟专用网中的合法数据包不必解密即可通过防火墙。  相似文献   

8.
RBRS:一种基于角色的移动代理协作模型   总被引:2,自引:0,他引:2       下载免费PDF全文
李钢  李增智  王宇  王立 《电子学报》2002,30(5):636-639
在基于移动代理的应用中,相关的协作机制扮演着一个非常重要的作用,但当前的各种协作模型并不能很好的满足移动代理对协作的要求.本文提出了一种基于角色的协作思想,其核心就是将协作功能从移动代理的实现中分离出去,然后详细介绍了利用这种思想所实现的一个协作模型:RBRS,最后通过一个应用实例表明,这种功能的分离不但简化了代理的设计和实现,而且提高了整个系统可扩充性.  相似文献   

9.
在分析了传统的网络管理方法的问题和不足后,构建了一个基于移动代理的网络管理系统模型。随后,对agent关键技术进行分析,利用UML建模的原理,设计并实现了一些简单的网络管理功能。该系统结构主要包括以下3个部分:网管站(NMS),移动代理(MA),网络节点。通过仿真试验,发现该系统模型能最大限度的利用现有资源来完成网管的功能。  相似文献   

10.
移动代理的安全性成为了移动代理系统在Internet及其它现代网络技术中推广应用的瓶颈。详细分析了移动代理系统中在数据传递和通信链接、服务器系统资源、移动代理运行环境以及移动代理自身安全等方面存在的种种安全威胁和隐患。然后分别对传输中的移动代理、服务器资源、执行环境中移动代理的保护方案进行了系统的研究,创造性地将JavaCard技术用于构建安全的移动代理执行环境,并在此研究成果基础之上设计并开发出SMMA2002移动代理安全模型系统。  相似文献   

11.
王黎光  夏军利 《信息技术》2005,29(10):86-89
和传统的固定代理相比,移动代理可自主地在网络设备中迁移并进行本地数据采集和计算,这简化了网络管理者同代理之间的通信过程,降低了网管数据流量,减少了网管反应时间。首先,提出基于移动代理的SNMP网络管理体系的结构及实现,其次对比分析了传统SNMP网管的轮询和基于移动代理网管的串行、并行的访问方式,最后通过实验对上述三种方式的性能进行测试。实验结果表明,和传统固定代理相比,采用移动代理的网络管理体系能显著提高网络管理的效能。  相似文献   

12.
移动代理由于其灵活、移动、自治等特性被广泛应用,但对移动代理的安全性问题研究仍不充分。文章针对移动代理不同方面的安全问题加以分析,针对性地提出安全保护方案,为移动代理的进一步充分应用给出新思路。通过提高移动代理安全性,使移动代理技术在降低网络负载、减小所占带宽、提高系统效率等方面发挥更大效用。  相似文献   

13.
基于JavaCard的移动代理安全模型研究   总被引:3,自引:0,他引:3  
欲阻止恶意主机攻击移动代理,代理中的代码信息和数据信息必须被隐藏起来。同时,还要使它们对于执行环境来说是可访问和可执行的。现有措施大都采用软件方法(如密码技术),但并不足以解决恶意主机问题。一个完全不同的方法就是使用可信赖的且可抵御攻击的JavaCard来保护移动代理。本文讨论用JavaCard保护移动代理的机理,同时给出我们所设计的一个JavaCard的安全模型。  相似文献   

14.
Claimed as the next generation programming paradigm, mobile agent technology has attracted extensive interests in recent years. However, up to now, limited research efforts have been devoted to the performance study of mobile agent system and most of these researches focus on agent behavior analysis resulting in that models are hard to apply to mobile agent systems.To bridge the gap, a new performance evaluation model derived from operation mechanisms of mobile agent platforms is proposed. Details are discussed for the design of companion simulation software, which can provide the system performance such as response time of platform to mobile agent. Further investigation is followed on the determination of model parameters. Finally comparison is made between the model-based simulation results and measurement-based real performance of mobile agent systems. The results show that the proposed model and designed software are effective in evaluating performance characteristics of mobile agent systems. The proposed approach can also be considered as the basis of performance analysis for large systems composed of multiple mobile agent platforms.  相似文献   

15.
基于策略驱动的移动agent安全框架研究   总被引:3,自引:0,他引:3  
针对移动agent系统面临的安全问题,本文介绍了一种将安全性与agent平台融为一体的框架(SOMA),这个框架可根据实际移动agent应用系统的需要,灵活动态地提供不同质量的安全服务,并针对这一框架系统的局限性作进一步的研究和探讨,提出了一种新的基于硬件的保护策略(TPE)。  相似文献   

16.
Mobile agent security   总被引:2,自引:0,他引:2  
The agent paradigm is currently attracting much research. A mobile agent is a particular type of agent with the ability to migrate from one host to another, where it can resume its execution. We consider security issues that need to be addressed before multi-agent systems in general, and mobile agents in particular, can be a viable solution for a broad range of commercial applications. This is done by considering the implications of the characteristics given to agents and the general properties of open multi-agent systems. The paper then looks in some more detail at security technology and methods applicable to mobile agent systems.  相似文献   

17.
基于移动代理的入侵检测系统模型的研究   总被引:6,自引:1,他引:5  
阐述了基于移动代理的入侵检测系统的优势,提出了一个使用移动代理技术的入侵检测系统MAAFID。首先由数据收集代理(DCA)在网络中随机移动并收集信息,然后将收集到的信息传递给数据分析代理(DAA)来评估入侵发生的可能性。本文重点讨论了系统中数据收集代理的数目与检测出入侵发生的可能性二者之间的定量关系,最后还给出了一个仿真结果。  相似文献   

18.
Mobile agents are software entities consisting of code, data, and state that can migrate autonomously from host to host executing their code. In such scenario there are some security issues that must be considered. In particular, this paper deals with the protection of mobile agents against manipulation attacks performed by the host, which is one of the main security issues to solve in mobile agent systems. This paper introduces an infrastructure for mobile agent watermarking (MAW). MAW is a lightweight approach that can efficiently detect manipulation attacks performed by potentially malicious hosts that might seek to subvert the normal agent operation. MAW is the first proposal in the literature that adapts software watermarks to verify the execution integrity of an agent. The second contribution of this paper is a technique to punish a malicious host that performed a manipulation attack by using a trusted third party (TTP) called host revocation authority (HoRA). A proof‐of‐concept has also been developed and we present some performance evaluation results that demonstrate the usability of the proposed mechanisms. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   

19.
A mobile agent is a technological promising product. It is an executive program that can migrate from host to host, performing tasks autonomously. However, in an open environment, the mobile agent has many potential threats. Security becomes a critical issue for the mobile agent. Recently, Volker and Mehradad have constructed a mobile agent structure and designed a key assignment strategy to prevent the sensitive data to from being accessed by an unauthorized host. However, their scheme requires a larger agent size and a higher computational cost. In this paper, we shall propose an efficient key assignment scheme to enhance the performance of Volker and Mehradad's scheme. Only few computations and a fixed and small storage are required in our proposed scheme. Furthermore, our scheme can achieve the dynamic key management efficiently. It can also be implemented simply and practically. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   

20.
Wireless ad hoc networks are growing important because of their mobility, versatility, and ability to work with fewer infrastructures. The mobile ad hoc network is an autonomous system consisting of mobile nodes connected with wireless links. Establishing a path between two nodes is a complex task in wireless networks. It is still more complex in the wireless mobile ad hoc network because every node is no longer as an end node and an intermediate node. In this paper, it focuses on design of connectionless routing protocol for the wireless ad hoc networks based on the mobile agent concept. The proposed model tries to discover the best path taking into consideration some concerns like bandwidth, reliability, and congestion of the link. The proposed model has been simulated and tested under various wireless ad hoc network environments with the help of a different number of nodes. The results demonstrate that the proposed model is more feasible for providing reliable paths between the source and destination with the minimum control message packets over the network. It has delivered more number of packets to the destination over the network. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号