Advanced Search
Volume 27 Issue 6
Jun.  2005
Turn off MathJax
Article Contents
Wang Ru-chuan, Huang Hai-ping, Li Ming-yuan. The Study on Routing Security Management Scheme in Multi-mobile Agent System[J]. Journal of Electronics & Information Technology, 2005, 27(6): 978-982.
Citation: Wang Ru-chuan, Huang Hai-ping, Li Ming-yuan. The Study on Routing Security Management Scheme in Multi-mobile Agent System[J]. Journal of Electronics & Information Technology, 2005, 27(6): 978-982.

The Study on Routing Security Management Scheme in Multi-mobile Agent System

  • Received Date: 2003-12-25
  • Rev Recd Date: 2004-09-07
  • Publish Date: 2005-06-19
  • The rapid development of E-business network management has been promoting the broad applications on multi-mobile agents system. However, it made routing security management of this system more complex and flexible. Aimed at multi-mobile agents system, this paper proposes a new scheme of routing security management. Based on the idea of Guard Agent (Proxy Agent) whose responsibility is protecting Task Agent, this scheme introduces Trust Mechanism Verification Server and modifies the structure of traditional routing tables. It makes full use of the advantages of multi-mobile agents cooperation interaction, improves the safety and efficiency of routing and ensures optimization.
  • loading
  • Wang X F.[J].Yi X, Lam K Y. Secure information agent for internet trading. 11th Australian Joint Conference on Artificial Intelligence98. Vol. 1, No.544, Brisban, Australia: Springer- Verlag Publishers.1998,:-[2]Ye Yiming, Yi Xun. Coalition signature scheme in multi-agent system. 11th International World Wide Web Conference, Honolulu,Hawaii, USA, 7 - 11 May, 2002:96 - 102.[3]Chaum D.[J].van Heyst E. Group signatures. In D.W. Davies, editor,Proc. of Eurocrypt91, vol. 547 of LNCS, Springer-Verlag.1992,:-[4]Bresson E.[J].Stern J, Szydlo M. Threshold ring signature for ad-hoc groups, Advances in Cryptology-Proceedings of CRYPTO02,Santa Barbara, California, USA. August 18.2002,22:-[5]赖溪松,韩亮,张真诚著,张玉清,肖国镇改编.计算机密码学及其应用.北京:国防工业出版社,2001:第21章,196-199.[6]Roth V. Mutual protection of cooperating agents. In Jan Vitek and Christian Jensen, Editors, Secure Internet Programming: Security Issues for Mobile and Distributed Objects, vol. 1603 of Lecture Notes in Computer Science, 1997:275 - 285.[7]Dorigo M, Maniezzo V, Colorni A. The ant system: optimization by a colony of cooperating agents[J].IEEE Trans. on Systems, Man,and Cybernetics-PartB.1996, 26(1):29-[8]Mitrovic N, Arronategui U. Mobile agent security using proxyagents and trusted domains. Second International Workshop on Security of Mobile Multi-agent Systems (SEMAS 2002), Bologna,Italy, July 2002:81 - 83.[9]Sander T, Tschudin C. Protecting mobile agents against malicious hosts. Mobile Agents and Security, Springer-Verlag, Lecture Notes in Computer Science. No. 1419, 1998:44 - 60.[10]张云勇.移动Agent及其应用.北京:清华大学出版社,2002,第4章,28-35.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2130) PDF downloads(558) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return