A practical introduction to data structures and algorithm analysis
A practical introduction to data structures and algorithm analysis
Cryptographic support for fault-tolerant distributed computing
EW 7 Proceedings of the 7th workshop on ACM SIGOPS European workshop: Systems support for worldwide applications
Improving fault-tolerance by replicating agents
Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 2
Programming and Deploying Java Mobile Agents Aglets
Programming and Deploying Java Mobile Agents Aglets
Mobile Agent-Based Management in the INSERTProject
Journal of Network and Systems Management
An Open Secure Mobile Agent Framework for SystemsManagement
Journal of Network and Systems Management
Towards Fault-Tolerant and Secure Agentry
WDAG '97 Proceedings of the 11th International Workshop on Distributed Algorithms
Concordia: An Infrastructure for Collaborating Mobile Agents
MA '97 Proceedings of the First International Workshop on Mobile Agents
Security agility in response to intrusion detection
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
Mobile Agent Fault Tolerance for Information Retrieval Applications: An Exception Handling Approach
ISADS '03 Proceedings of the The Sixth International Symposium on Autonomous Decentralized Systems (ISADS'03)
Agent Tcl: a flexible and secure mobile-agent system
TCLTK'96 Proceedings of the 4th conference on USENIX Tcl/Tk Workshop, 1996 - Volume 4
Hi-index | 0.00 |
In the dynamic network security system based on mobile agents, agent migration and fault-tolerance management is a critical issue. However, the issue has always been neglected in early similar works. Aiming at such problem, this paper makes research about it. First, the one-hop migration strategy of agents is presented based on ant algorithms. A novel agent fault-tolerance migration mechanism realised by integrity verification is presented. Then a Combined Agent Migration and Fault-Tolerance Strategy (CAMFS) is presented according to the agent characteristics in a dynamic network security system. Lastly, the advantages of CAMFS are discussed in comparison with other similar works.