[1]徐小龙 程春玲 陈丹伟 熊婧夷.一种应用于对等网络的可信片上Agent模型[J].计算机技术与发展,2010,(09):140-144.
 XU Xiao-long,CHENG Chun-ling,CHEN Dan-wei,et al.Research on Model of Trusted Agent-on-Chip for P2P Networks[J].,2010,(09):140-144.
点击复制

一种应用于对等网络的可信片上Agent模型()

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2010年09期
页码:
140-144
栏目:
安全与防范
出版日期:
1900-01-01

文章信息/Info

Title:
Research on Model of Trusted Agent-on-Chip for P2P Networks
文章编号:
1673-629X(2010)09-0140-05
作者:
徐小龙 程春玲 陈丹伟 熊婧夷
南京邮电大学计算机学院
Author(s):
XU Xiao-longCHENG Chun-lingCHEN Dan-weiXIONG Jing-yi
College of Computer,Nanjing University of Posts and Telecommunications
关键词:
对等网络Agent芯片片上系统安全
Keywords:
peer-to-peer networks Agent chip system-on-chip security
分类号:
TP393.08
文献标志码:
A
摘要:
提出一种可信片上Agent模型(T-AoC),它用于开放的、不安全的、面向网络边缘节点的对等网络环境中。为了有效保护应用Agent计算的系统中的Agent不被恶意Agent执行环境及Peer主机对Agent的攻击,T-AoC模型采用集成芯片作为硬件基础为Agent提供安全、可靠的执行环境。该芯片可安装在各需要运行Agent及其应用系统的对等网络节点主机上。基于信任关系转移的思想,增强对等网络节点之间的可信性,更有效地构建各种安全、可靠的基于Agent的P2P应用系统。具体描述了T-AoC模型的层次架构、工
Abstract:
A Trusted Agent-on-Chip model(T-AoC) is presented in this paper,which could be used in open,insecure Peer-to-Peer network computing environment make up of edge nodes of Internet.In order to effectively protect Agents in the Agent application systems from attacks of malicious Agent execution environments and hosts,T-AoC model adopts the integrated chip as the hardware foundation to provide a safe and reliable execution environment for Agent.The chip can be installed in the host of peers needing to run Agent-based systems.Based on the idea of trust relation transfer,the credibility of peer is enhanced,and it is more efficient to build a variety of safe and reliable Agent-based P2P applications. This paper describes the architecture,working principle and operation process of T-AoC model in detail,as well as how to deploy T-AoC in the P2P network information search system demo.The performance analysis of T-AoC is presented at the end of this paper

相似文献/References:

[1]裘杭萍 肖登海 连向磊 王玲玲.一种新的基于Agent的体系结构[J].计算机技术与发展,2010,(01):46.
 QIU Hang-ping,XIAO Deng-hai,LIAN Xiang-lei,et al.A New Architecture Based on Agent[J].,2010,(09):46.
[2]张祖昶,王诚.P2P网络的信任评估安全模型研究[J].计算机技术与发展,2014,24(01):163.
 ZHANG Zu-chang,WANG Cheng.Research of a Safe Model of Trust Evaluation for P2 P Network[J].,2014,24(09):163.
[3]田翠华 于天放 刘革.基于Agent技术的交通流仿真研究[J].计算机技术与发展,2010,(02):233.
 TIAN Cui-hua,YU Tian-fang,LIU Ge.Research on Traffic Flow Simulation Based on Agent Technology[J].,2010,(09):233.
[4]孙名松 邸明星 王湛昱.多决策树算法在P2P网络流量检测中的应用[J].计算机技术与发展,2010,(06):126.
 SUN Ming-song,DI Ming-xing,WANG Zhan-yu.Application of Decision Tree Algorithm in Traffic Detection of P2P Network[J].,2010,(09):126.
[5]李莹峰 邓晓衡.DHT网络中基于测量的QoS监控系统[J].计算机技术与发展,2009,(05):188.
 LI Ying-feng,DENG Xiao-heng.Measurement- Based QoS Monitor System in DHT Network[J].,2009,(09):188.
[6]蔡增玉 甘勇 金宝华 冯媛 贺蕾.Agent在物流领域中的应用研究[J].计算机技术与发展,2009,(06):232.
 CAI Zeng-yu,GAN Yong,JIN Bao-hua,et al.Research on Application of Agent in Field of Logistics[J].,2009,(09):232.
[7]贺锋 王汝传.一种基于PKI的P2P身份认证技术[J].计算机技术与发展,2009,(10):181.
 HE Feng,WANG Ru-chuan.A Peer- to- Peer Identity Authentication Technology Based on PKI[J].,2009,(09):181.
[8]吴敏 王汝传 王治平.基于支持向量机的P2P网络DoS攻击检测[J].计算机技术与发展,2009,(11):151.
 WU Min,WANG Ru-chuan,WANG Zhi-ping.Detection Mechanism of DoS Attacks in Peer- to- Peer Networks Based on Support Vector Machine[J].,2009,(09):151.
[9]刘毅 张月琳.基于Agent的邮件过滤与个性化分类系统设计[J].计算机技术与发展,2009,(02):66.
 LIU Yi,ZHANG Yue-lin.Design of a Mail Filter and Personalized Classification System Based on Agent[J].,2009,(09):66.
[10]郭晶 吴国新 李想.P2P网络环境下信任模型的研究与实现[J].计算机技术与发展,2009,(03):102.
 GUO Jing,WU Guo-xin,LI Xiang.Research and Design for Trust Model in P2P Network[J].,2009,(09):102.

备注/Memo

备注/Memo:
教育部博士点基金(20093223120001) 教育部专项研究课题(2009117); 江苏省科技支撑计划(BE2009158); 江苏省高校自然科学研究项目(09KJB520010)徐小龙(1977-),男,副教授。博士,研究方向为计算机软件、分布式计算、Agent技术和信息安全等
更新日期/Last Update: 1900-01-01