Advanced Search
Volume 26 Issue 12
Dec.  2004
Turn off MathJax
Article Contents
Wang Ru-chuan, Mu Hong, Xu Xiao-long. Research and Implementation of Migration Mechanism in MAS[J]. Journal of Electronics & Information Technology, 2004, 26(12): 2006-2012.
Citation: Wang Ru-chuan, Mu Hong, Xu Xiao-long. Research and Implementation of Migration Mechanism in MAS[J]. Journal of Electronics & Information Technology, 2004, 26(12): 2006-2012.

Research and Implementation of Migration Mechanism in MAS

  • Received Date: 2003-07-12
  • Rev Recd Date: 2004-03-09
  • Publish Date: 2004-12-19
  • This paper surveys some typical approaches to migration models used in Mobile Agent System(MAS) and describes the migration mechanism in MAS which is designed and implemented by authors. Focused on the issues about the agents dynamic routing and migration-related security changing, an extended migration mechanism of agent is proposed and an application example is given.
  • loading
  • Chess D M. Security issues in mobile code systems. In G Vigna, editor, Mobile Agents and Security, volume 1419 of Lecture Notes in Computer Science, New York, NY: Springer-Verlag,1998, 1-14.[2]Karnik N M, Tripathi A R. Design 3s in mobile agent programming systems[J].IEEE Concurrency Magazine.1998, 6(3):52-61[3]Wang X F, Yi X, Lam K Y, Okamoto E. 1998, Secure information gathering agent for internet trading. Proc. of the 4th Australian Workshop on Distributed Artificial Intelligence in joint with the 8th Australian Joint Conference on Artificial Intelligence (DAI 1998), Australia, Lecture Notes in Artificial Intelligence, Springer-Verlag, Vo1.1544: 183-193.[4]陶先平,吕建,张冠群,李新,董桓.一种移动Agent结构化迁移机制的设计和实现.软件学报,2000,11(7):918-923.[5]Eckel B. Thinking in Java, 2nd Edition, Upper Saddle River, New Jersey: Prentice-Hall, 2000:973-980.[6]Schaaf M, Maurer F. Integrating Java and CORBA: A programmers perspective[J].IEEE Internet Computing Magazine.2001, 5(1):72-78[7]Wilhelm U G, Staamann S M, Buttyan L. A pessimistic approach to trust in mobile agent platforms[J].IEEE Internet Computing Magazine.2000, 4(5):40-48[8]Farmer W, Guttmann J, Swarup V. (1996). Security for mobile agents: Authentication and state appraisal. In Proc. of the European Symposium on Research in Computer Security (ESORICS),LNCS, No.1146, Berlin: Springer-Verlag, 1996: 118-130.[9]王汝传,徐小龙.移动代理安全机制的研究.计算机学报,2002,25(12):1294-1301.[10]王汝传,赵新宁.基于网络的移动代理系统安全模型研究和分析.计算机学报,2003,26(4):477-483.[11]Schneier B. Applied Cryptography: Protocols.[J].Algorithms, and Source Code in C. New York:John Wiley Sons.1996,:-
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2009) PDF downloads(486) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return