Font Size: a A A

A Study Of Mobile Computation And Its Security Based On Agent

Posted on:2008-08-05Degree:DoctorType:Dissertation
Country:ChinaCandidate:W T YuFull Text:PDF
GTID:1118360212476682Subject:Circuits and Systems
Abstract/Summary:PDF Full Text Request
The recent rapid development of computer network technology and tele- communications technology have made it possible to envisage a global computing platform; Meanwhile, with rapid component miniaturization and the emergence of high-speed wireless communication, various devices like notebook computer, mobile phones, PDAs and other information home appliances are connected to the networks too. At present time, mobile computation system with properties like the concurrency, mobility, distribution, real time, heterogeneity and interoperability have become the main direction of current computer technology, and have been widely applied to development of real information system. For mobile computation, security is the key aspect for its successful application.The formal methods and theory of mobile computation based on agent have been studied in this paper. Farther more, with the formal platform designed in this paper, a deep study relating to security in mobile computation have been carried off. These studies included static security analyzing, security information flow analyzing and dynamic monitoring technology based on security automaton. At last, a kind of mobile infrastructure and message passing algorithm based on agent have been designed. The main task includes the following six aspects:(1) First, the security requirements, security threats and security mechanisms have been deeply studied, then constructed a uniform security structure in mobile computation. The mobile system description and security formality can be...
Keywords/Search Tags:process, agent, type system, non-interference security, secure automaton, security policy, mobile infrastructure
PDF Full Text Request
Related items