نتایج جستجو برای: protection agent
تعداد نتایج: 428050 فیلتر نتایج به سال:
The Micro-grid, even though not a replacement of the conventional centralized power transmission grid, plays a very important role in the success of rapid development of renewable energy resources technologies. Due to the facts of decentralization, independence and dynamic of sources within a Micro-grid, a high level automation of protection is a must. Multi-Agent system as a approach to handle...
Mobile Agents is a new paradigm for distributed computing where security is very essential to the acceptance of this paradigm in a large scale distributed environment. In this paper, we propose protection mechanisms for mobile agents. In these mechanisms, the authentication of mobile agents and the access control to the system resources are controlled by the mobile-agents platform. Each agent d...
Security issues are the most challenging problems in cloud computing environments as an emerging technology. Regarding to this importance, an efficient and reliable user authentication and data protection model has been presented in this paper to increase the rate of reliability cloud-based environments. Accordingly, two encryption procedures have been established in an independent middleware (...
Security and anonymity are vital for some types of agent-based e-commerce applications. In order to provide secure and anonymous communication protection for multi-agent systems, we have developed an alternate Onion Routing approach based on agile agents under JADE multi-agent platform. In this paper, we present a simulation of the protocol and analyze its scalability.
Security and anonymity are vital for some types of agent-based e-commerce applications. In order to provide secure and anonymous communication protection for multi-agent systems, we have developed an alternate Onion Routing approach based on agile agents under JADE multi-agent platform. In this paper, we present a simulation of the protocol and analyze its scalability.
Electronic commerce is one of the most important application areas of mobile agent technology. A secure mobile agent system (SMAS) model is established for e-commerce environment. The SMAS consists of mobile agents and mobile agent server. A security shell module in the mobile agent architecture is responsible for mobile agent protection. Surveillance agent running in the agent server provides ...
Mobile agent technology presents an attractive alternative to the client-server paradigm; however, the lack of a feasible agent security model seriously hinders the adoption of the agent paradigm. This paper describes a mobile agent platform, Secure Mobile Agent Platform (SECMAP) and its security infrastructure. SECMAP presents abstractions which ensure the protection of agents and system compo...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید