Font Size: a A A

Research Of Workstation Security Evaluation Based On Immune Danger Theory

Posted on:2009-02-15Degree:MasterType:Thesis
Country:ChinaCandidate:L N GaoFull Text:PDF
GTID:2178360245994662Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
A Workflow was a calculation model of business process that had a fixed pattern. It adopted in the computer environment to concentrate on business processes and business process automation, in the realization of a number of participants between the use of computers, according to the rules of a scheduled automatic transmission documents, information or tasks to achieve greater efficiency and reduce human errors Objective. With the size of the business and expand the distribution of information resources decentralized, distributed a work flow system must achieve requirements. The emergence of mobile Agent technology for building work flow system provides a new choice.Mobile Agent technology had many advantages, such as reducing the network flux, suit the mobile user, helpful to data integration and possess parallel feature, etc .It is helpful for solving the performance problem in tradition workflow system which was caused by frequently transmitting data and service. In migrating workflow system that based on the mobile computing paradigm, the three elements were migrating workflow management engine,migrating instance and workstation. Management engine was in charge of the definition of workflow procedure, the generation of migrating instance and the coordination of migrating instances; Workstation which referees to the anchorage server and working-machine network was the workspace of migrating instance; migrating instance was defined as the executor of tasks, it was generated by management engine and can migrated within workstations, using the local resources and services provided by workstation executing one or many tasks. When MI finds current workstation can't satisfies the requirement of executing task, MI can migrated to another workstation that can satisfies its requirement and continue executing. However, the migrating instance which was built by mobile Agent technology, also took in new security issues.The risk in migrating workflow system can be divided into the security of the workstation and migrating instance. There are still some other security problems, such as, migrating workflow system security protection completeness, migrating workflow system security evaluation, etc.Based on the above research background, this paper focused on migrating workflow system security evaluation problem. Based on the information system security evaluation technology, we gives the methods of migrating workflow system security evaluation, and built up the migrating workflow system security evaluation model and gives all of the security elements of the security formula and the algorithm and examples of calculating the security of migrating workflow system.This paper which was based on the principle of immune danger theory, gives a method which can evaluate the security of workstation by status of the migrating instance's task. The method first clarified the working principle of the system, it gives the mapping relationship between the biological immune system and workstation security evolution system, it proposed the method to classify of Migrating Instance's task, it constructed antibody and antigen, it proposed the antigen's classification method. It also proposed the danger and affinity's definition and the calculation formula.Then it established a model of workstation security evaluation, described the work way of the model and each module was given a function. The paper gives a definition of gene,description of the selection process to getting antibodies set,antibody Cloning Variation process,antibodies evolutionary process,calculation method of the danger signals,process of getting the danger signals and the formula which can calculate the security of the workstation. Comparison of risk based on the theory of immune danger algorithms and artificial immune algorithm based on the experimental results of operations, that the former had better immune learning efficiency and lower rates of FP.
Keywords/Search Tags:migrating workflow, Workstation, migrating instance, immune danger theory, Security evaluation
PDF Full Text Request
Related items