高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

MAS系统中迁移机制的研究与实现

王汝传 穆鸿 徐小龙

王汝传, 穆鸿, 徐小龙. MAS系统中迁移机制的研究与实现[J]. 电子与信息学报, 2004, 26(12): 2006-2012.
引用本文: 王汝传, 穆鸿, 徐小龙. MAS系统中迁移机制的研究与实现[J]. 电子与信息学报, 2004, 26(12): 2006-2012.
Wang Ru-chuan, Mu Hong, Xu Xiao-long. Research and Implementation of Migration Mechanism in MAS[J]. Journal of Electronics & Information Technology, 2004, 26(12): 2006-2012.
Citation: Wang Ru-chuan, Mu Hong, Xu Xiao-long. Research and Implementation of Migration Mechanism in MAS[J]. Journal of Electronics & Information Technology, 2004, 26(12): 2006-2012.

MAS系统中迁移机制的研究与实现

Research and Implementation of Migration Mechanism in MAS

  • 摘要: 该文分析了现有移动代理系统的几种代表性的迁移技术,阐述了在作者设计的移动代理系统(Mobile Agent System,MAS)中代理迁移机制的具体实现,着重解决了代理的动态路由和与迁移相关的安全要素的改变,并提出了一种扩展的代理迁移机制,最后给出了应用实例分析。
  • Chess D M. Security issues in mobile code systems. In G Vigna, editor, Mobile Agents and Security, volume 1419 of Lecture Notes in Computer Science, New York, NY: Springer-Verlag,1998, 1-14.[2]Karnik N M, Tripathi A R. Design 3s in mobile agent programming systems[J].IEEE Concurrency Magazine.1998, 6(3):52-61[3]Wang X F, Yi X, Lam K Y, Okamoto E. 1998, Secure information gathering agent for internet trading. Proc. of the 4th Australian Workshop on Distributed Artificial Intelligence in joint with the 8th Australian Joint Conference on Artificial Intelligence (DAI 1998), Australia, Lecture Notes in Artificial Intelligence, Springer-Verlag, Vo1.1544: 183-193.[4]陶先平,吕建,张冠群,李新,董桓.一种移动Agent结构化迁移机制的设计和实现.软件学报,2000,11(7):918-923.[5]Eckel B. Thinking in Java, 2nd Edition, Upper Saddle River, New Jersey: Prentice-Hall, 2000:973-980.[6]Schaaf M, Maurer F. Integrating Java and CORBA: A programmers perspective[J].IEEE Internet Computing Magazine.2001, 5(1):72-78[7]Wilhelm U G, Staamann S M, Buttyan L. A pessimistic approach to trust in mobile agent platforms[J].IEEE Internet Computing Magazine.2000, 4(5):40-48[8]Farmer W, Guttmann J, Swarup V. (1996). Security for mobile agents: Authentication and state appraisal. In Proc. of the European Symposium on Research in Computer Security (ESORICS),LNCS, No.1146, Berlin: Springer-Verlag, 1996: 118-130.[9]王汝传,徐小龙.移动代理安全机制的研究.计算机学报,2002,25(12):1294-1301.[10]王汝传,赵新宁.基于网络的移动代理系统安全模型研究和分析.计算机学报,2003,26(4):477-483.[11]Schneier B. Applied Cryptography: Protocols.[J].Algorithms, and Source Code in C. New York:John Wiley Sons.1996,:-
  • 加载中
计量
  • 文章访问数:  2023
  • HTML全文浏览量:  84
  • PDF下载量:  486
  • 被引次数: 0
出版历程
  • 收稿日期:  2003-07-12
  • 修回日期:  2004-03-09
  • 刊出日期:  2004-12-19

目录

    /

    返回文章
    返回