咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Study of the Security in Netwo... 收藏

Study of the Security in Network Management Based on Mobile Agents

Study of the Security in Network Management Based on Mobile Agents

作     者:CHEN Zhi~1 WANG Ru-chuan~(1,2)1.Department of Computer Science and Technology,Nanjing University of Posts and Telecommunications,Nanjing 210003,P.R.China 2.State Key Laboratory for Novel Software Technology,Nanjing University,Nanjing 210093,P.R.China 

作者机构:Department of Computer Science and Technology Nanjing University of Posts ard Telecommunications Nanjing 210003 

出 版 物:《The Journal of China Universities of Posts and Telecommunications》 (中国邮电高校学报(英文版))

年 卷 期:2004年第11卷第4期

页      面:37-42页

核心收录:

学科分类:080904[工学-电磁场与微波技术] 0810[工学-信息与通信工程] 0809[工学-电子科学与技术(可授工学、理学学位)] 08[工学] 080402[工学-测试计量技术及仪器] 0804[工学-仪器科学与技术] 081001[工学-通信与信息系统] 

基  金:FoundationItern:ThisworkissupportedbyNationalNaturalScienceFoundationofChina(No.60173037&70271050)NaturalScienceFoundationofJiangsuProvince(No.BK2003105&BK2004218)National"863"HighTechnologyResearchProgramofChina(No.2004AA775053)HighTechnologyResearchProgrammeofJiangsuProvinc(No.BG2004004)KeyLaboratoryofInformationTechnologyProcessingofJiangsuProvince.(No.kjs03061&kjs04) 

主  题:network management mobile agent security Java card cryptography 

摘      要:Security of mobile-agent based network management must be considered due to the widespread adoption of mo-bile agents in network management,which involves the protections of mobile agents,management station and managed *** integrated security model proposed in our paper incorporates the effective security countermeasures of these entitiesinto a trusted execution environment and two security protection *** based on Java virtual machine and Javacard independent on the network devices also with the cryptography technology in this model together protect the networkmanagement process.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分