• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 21
  • 4
  • 3
  • 3
  • 3
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 42
  • 42
  • 16
  • 15
  • 14
  • 14
  • 11
  • 9
  • 9
  • 9
  • 8
  • 7
  • 7
  • 7
  • 6
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Selection of mobile agent systems based on mobility, communication and security aspects

Lall, Manoj 30 June 2005 (has links)
The availability of numerous mobile agent systems with its own strengths and weaknesses poses a problem when deciding on a particular mobile agent system. In this dissertation, factors based on mobility, communication and security of the mobile agent systems are presented and used as a means to address this problem. To facilitate in the process of selection, a grouping scheme of the agent system was proposed. Based on this grouping scheme, mobile agent systems with common properties are grouped together and analyzed against the above-mentioned factors. In addition, an application was developed using the Aglet Software Development Toolkit to demonstrate certain features of agent mobility, communication and security. / Theoretical Computing / M. Sc. (Computer Science)
32

Um modelo de gerência de segurança para middleware baseado em tuple para ambientes difusos e nômades. / A model of security management for middleware based on tuple in diffuse and nomadic environments.

Désiré, Nguessan 18 December 2009 (has links)
Este trabalho explora a gerência de segurança e cooperação de aplicações em sistemas distribuídos móveis. Neste contexto, é feito um estudo sobre os diferentes middlewares para ambientes móveis (mobile middleware): suas capacidades de enfrentar os desafios da mobilidade e da segurança. As análises do estudo mostram que esses middlewares devem possuir características que lhes permitem uma melhor adaptação às necessidades das aplicações e à natureza dos ambientes móveis. Os middlewares existentes pouco abordam a questão da segurança. A segurança ainda é um problema complexo que deve ser gerido em todos os níveis de um sistema distribuído móvel, incluindo novos mecanismos. Com base nessa análise, foi desenvolvido um modelo de gerência de segurança que implementa um mecanismo de autenticação mútua, confidencialidade, detecção de intruso e controle de acesso em ambientes móveis. O objetivo é garantir a confiabilidade, a disponibilidade de serviços e a privacidade do usuário através da tecnologia PET - Privacy-Enhancing Tecnologies. A idéia é fundamentada em agentes interceptadores e autoridades de segurança que distribuem tíquetes de segurança e controlam o acesso a recursos e espaços de tuple do ambiente. O estudo de caso apresentou resultados satisfatórios que permitem julgar a pertinência do modelo proposto. O modelo será integrado a um sistema de e-saúde. / The work exploits the security management and the cooperation of applications in mobile distributed systems. In this context a study of different mobile middleware is made. The study examines their capacities to face the challenges of mobility and security issues. The analysis shows that the existing middleware has very few approaches on security problems; security is still a complex issue to be managed in all the levels of mobile distributed system including new mechanisms. Based on this analysis, a security management model is developed that implements a mechanism for mutual authentication, confidentiality, intrusion detection, access control of mobile agents in mobile environments, ensures services availability and user privacy, through technology PET (Privacy-Enhancing Technologies). The idea is based on interceptor agents and security authorities that distribute security tickets and control the access to resources and Tuple spaces in mobile environment. The proposed model presents good performance and is integrated to an e-health system: Relationship Management with Chronic Patient GRPC.
33

Conception et Optimisation Distribuée d’un Système d’Information des Services d’Aide à la Mobilité Urbaine Basé sur une Ontologie Flexible dans le Domaine de Transport / Design and Optimization of Distributed Information Systems of Services to Aid Urban Mobility Based on a Flexible Ontology in the Transport Domain

Saad, Sawsan 10 December 2010 (has links)
De nos jours, les informations liées au déplacement et à la mobilité dans un réseau de transport représentent sans aucun doute un potentiel important.Ces travaux visent à mettre en œuvre un Système d’Information de Service d’Aide à la Mobilité Urbaine (SISAMU).Le SISAMU doit pouvoir procéder par des processus de décomposition des requêtes simultanées en un ensemble de tâches indépendantes. Chaque tâche correspond à un service qui peut être proposé par plusieurs fournisseurs d’information en concurrence, avec différents coûts, temps de réponse et formats. Le SISAMU est lié à un Réseau informatique Etendu et distribué de Transport Multimodal (RETM) qui comporte plusieurs sources d’information hétérogènes des différents services proposés aux utilisateurs de transport. L’aspect dynamique, distribué et ouvert du problème, nous a conduits à adopter une modélisation multi-agent pour assurer au système une évolution continue et une flexibilité pragmatique. Pour ce faire, nous avons proposé d’automatiser la modélisation des services en utilisant la notion d’ontologie. Notre SISAMU prend en considération les éventuelles perturbations sur le RETM.Ansi, nous avons créé un protocole de négociation entre les agents. Le protocole de négociation proposé qui utilise l’ontologie de la cartographie se base sur un système de gestion des connaissances pour soutenir l'hétérogénéité sémantique. Nous avons détaillé l’Algorithme de Reconstruction Dynamique des Chemins des Agents (ARDyCA) qui est basé sur l’approche de l’ontologie cartographique. Finalement, les résultats présentés dans cette thèse justifient l’utilisation de l’ontologie flexible et son rôle dans le processus de négociation / Nowadays, information related on displacement and mobility in a transport network represents certainly a significant potential. So, this work aims to modeling, to optimize and to implement an Information System of Services to Aid the Urban Mobility (ISSAUM).The ISSAUM has firstly to decompose each set of simultaneous requests into a set of sub-requests called tasks. Each task corresponds to a service which can be proposed different by several information providers with different. An information provider which aims to propose some services through our ISSAUM has to register its ontology. Indeed, ISSAUM is related to an Extended and distributed Transport Multimodal Network (ETMN) which contains several heterogeneous data sources. The dynamic and distributed aspects of the problem incite us to adopt a multi-agent approach to ensure a continual evolution and a pragmatic flexibility of the system. So, we proposed to automate the modeling of services by using ontology idea. Our ISSAUM takes into account possible disturbance through the ETMN. In order to satisfy user requests, we developed a negotiation protocol between our system agents. The proposed ontology mapping negotiation model based on the knowledge management system for supporting the semantic heterogeneity and it organized as follow: Negotiation Layer (NL), the Semantic Layer (SEL), and the Knowledge Management Systems Layer(KMSL).We detailed also the reassignment process by using Dynamic Reassigned Tasks (DRT) algorithm supporting by ontology mapping approach. Finally, the experimental results presented in this thesis, justify the using of the ontology solution in our system and its role in the negotiation process
34

Um modelo de gerência de segurança para middleware baseado em tuple para ambientes difusos e nômades. / A model of security management for middleware based on tuple in diffuse and nomadic environments.

Nguessan Désiré 18 December 2009 (has links)
Este trabalho explora a gerência de segurança e cooperação de aplicações em sistemas distribuídos móveis. Neste contexto, é feito um estudo sobre os diferentes middlewares para ambientes móveis (mobile middleware): suas capacidades de enfrentar os desafios da mobilidade e da segurança. As análises do estudo mostram que esses middlewares devem possuir características que lhes permitem uma melhor adaptação às necessidades das aplicações e à natureza dos ambientes móveis. Os middlewares existentes pouco abordam a questão da segurança. A segurança ainda é um problema complexo que deve ser gerido em todos os níveis de um sistema distribuído móvel, incluindo novos mecanismos. Com base nessa análise, foi desenvolvido um modelo de gerência de segurança que implementa um mecanismo de autenticação mútua, confidencialidade, detecção de intruso e controle de acesso em ambientes móveis. O objetivo é garantir a confiabilidade, a disponibilidade de serviços e a privacidade do usuário através da tecnologia PET - Privacy-Enhancing Tecnologies. A idéia é fundamentada em agentes interceptadores e autoridades de segurança que distribuem tíquetes de segurança e controlam o acesso a recursos e espaços de tuple do ambiente. O estudo de caso apresentou resultados satisfatórios que permitem julgar a pertinência do modelo proposto. O modelo será integrado a um sistema de e-saúde. / The work exploits the security management and the cooperation of applications in mobile distributed systems. In this context a study of different mobile middleware is made. The study examines their capacities to face the challenges of mobility and security issues. The analysis shows that the existing middleware has very few approaches on security problems; security is still a complex issue to be managed in all the levels of mobile distributed system including new mechanisms. Based on this analysis, a security management model is developed that implements a mechanism for mutual authentication, confidentiality, intrusion detection, access control of mobile agents in mobile environments, ensures services availability and user privacy, through technology PET (Privacy-Enhancing Technologies). The idea is based on interceptor agents and security authorities that distribute security tickets and control the access to resources and Tuple spaces in mobile environment. The proposed model presents good performance and is integrated to an e-health system: Relationship Management with Chronic Patient GRPC.
35

個人行動代理服務模式之建置—在整合性金融資產管理帳戶之應用

白志偉 Unknown Date (has links)
行動代理人(Mobile Agent)是一種常被應用於分散式處理及行動運算的技術之一。尤其近幾年在網際網路的普及與Java語言的誕生後,更是結合了這兩者特性,在Web上蔓延開來,許多行動代理開發工具本身便是純Java語言撰寫的,而且亦有為數不少的行動代理人應用系統直接就是建構於Web平台上。  本研究運用行動代理技術建構一行動代理人服務提供者(Mobile Agent Service Provider,MASP)應用模式,以Web為平台,將各種服務以行動代理人的方式來開發,然後提供給客戶。客戶可藉由這些服務所具備的諸多行動代理人特性,來進行個人資訊管理工作。研究問題主要係針對現今一般人所擁有的金融帳戶過多造成理財困擾,以及目前的網路銀行或金融帳戶管理系統無法做到跨行跨業這兩方面來進行改良。客戶只需連線上站,即可要求代理程式為他服務。不論人在哪裡,便會自動收到代理人從與其有往來的各網路銀行網站中所擷取回來的帳戶最新資料,然後便可用單一帳戶將這些資料加以彙整管理;甚至在離線後,亦能讓代理程式以其預先設定好的工作而自動繼續執行任務,不必擔心作業中斷。客戶可以將其個人帳戶資料儲存於自己的電腦中,而不必擔心若存於系統伺服器可能產生的潛在安全性問題。因此客戶只須利用此單一整合帳戶(All-in-One Account)即可進行跨行整合的個人理財活動,輕鬆達成帳戶彙整(Account Aggregation)管理。  本研究從使用者主導的角度來發展此服務架構,希望此模式能應用於其他領域上,以使行動代理的發展更加全方位及人性化。
36

行動傳訊代理人之建置-在網際網路傳訊機制之應用

戴千鴻, Tai, Cheng-Hung Unknown Date (has links)
近年來網路的快速發展與普及,而由於使用網路的人口快速增加,資訊傳遞日益頻繁,使用網際網路來做為傳遞訊息工具,有逐漸上升趨勢。本研究的主要目的是利用行動代理人技術發展一於應用於網際網路上的傳訊機制,這個機制稱之為行動傳訊代理人(Mobile-Messaging Agent),主要是讓訊息、郵件可以跟著使用者所在位置而傳送,並且建構一個使用者專屬的信差。而這樣的傳訊機制包含了四個元件:(1)Messenger,即為信差代理人,負責幫使用者接收郵件、訊息﹔(2)AgentFinder,為負責接受使用者的要求來搜尋Messenger﹔(3)MessengerFinder,為行動傳訊代理人系統與使用者溝通的介面,是負責幫助使用者呼叫Messenger﹔(4)Register,為MessengerFinder啟動時,幫助尋找AgentFinder。而根據本研究實作行動傳訊代理人系統結果發現,行動傳訊代理人應用於網際網路之傳訊機制,具有降低伺服主機負載、增加網路連線品質、訊息有效管理、資料隱私性及安全性高、訊息自主性、易跨平台等優點。  而以行動傳訊代理人建置傳訊機制,使得訊息物件具有行動力、自主性、延展性,未來,期望行動傳訊代理人可以整合至可攜性較高的行動設備,例如膝上型電腦、數位個人助理(PDA)或是行動電話,最後,透過此系統行動傳訊代理人的自主性與行動性,讓使用者無論走到那裡,都可以即時收取訊息、郵件。
37

Applying mobile agents in an immune-system-based intrusion detection system

Zielinski, Marek Piotr 30 November 2004 (has links)
Nearly all present-day commercial intrusion detection systems are based on a hierarchical architecture. In such an architecture, the root node is responsible for detecting intrusions and for issuing responses. However, an intrusion detection system (IDS) based on a hierarchical architecture has many single points of failure. For example, by disabling the root node, the intrusion-detection function of the IDS will also be disabled. To solve this problem, an IDS inspired by the human immune system is proposed. The proposed IDS has no single component that is responsible for detecting intrusions. Instead, the intrusion-detection function is divided and placed within mobile agents. Mobile agents act similarly to white blood cells of the human immune system and travel from host to host in the network to detect intrusions. The IDS is fault-tolerant because it can continue to detect intrusions even when most of its components have been disabled. / Computer Science (School of Computing) / M. Sc. (Computer Science)
38

Selection of mobile agent systems based on mobility, communication and security aspects

Lall, Manoj 30 June 2005 (has links)
The availability of numerous mobile agent systems with its own strengths and weaknesses poses a problem when deciding on a particular mobile agent system. In this dissertation, factors based on mobility, communication and security of the mobile agent systems are presented and used as a means to address this problem. To facilitate in the process of selection, a grouping scheme of the agent system was proposed. Based on this grouping scheme, mobile agent systems with common properties are grouped together and analyzed against the above-mentioned factors. In addition, an application was developed using the Aglet Software Development Toolkit to demonstrate certain features of agent mobility, communication and security. / Theoretical Computing / M. Sc. (Computer Science)
39

Resource-oriented mobile agent and software framework for the Internet of Things

Leppänen, T. (Teemu) 13 March 2018 (has links)
Abstract The Internet of Things vision proposes a global platform in an unforeseen scale for distributed applications that rely on data provided by interconnected resource-constrained things. In such large-scale systems, centralized control of system operation by a single component through vertical interactions becomes unfeasible. Ideally, decentralized control in the proximity of things enables to take into account the local dynamic resource availability and environmental characteristics that are used to optimize the application execution. To realize decentralization, capabilities for horizontal interactions, that complement the vertical interactions, and for opportunistic participation of things are needed. This thesis explores mobile agent technology to implement distributed Internet of Things applications that benefit from both vertical and horizontal interactions of the application components. First, a resource-oriented reactive mobile agent architecture and a software framework are presented. The framework facilitates RESTful interactions between agents and other system components and provides a REST-based interface to build opportunistic agent-based applications. Two agent platforms are presented that integrate resource-constrained things into the framework as mobile agent hosts. Second, mobile agent based mobile crowdsensing and edge computing applications are evaluated with large-scale simulations and real-world experiments. The results show that energy consumption is decreased in the participating things, in comparison with the existing approaches, by agent-based in-network data processing and control of the thing operation. This thesis makes a valuable contribution by enabling mobile agent operations in a heterogeneous set of resource-constrained things. The presented empirical evidence shows how mobile agent technology increases energy efficiency in distributed application execution. The presented mobile agent architecture and software framework potentially accelerate the utilization of mobile agent technology in the Internet of Things. / Tiivistelmä Esineiden Internet liittää resurssirajoitteiset sulautetut laitteet laajamittaisesti Internet-verkkoon, jossa niiden tuottamaa tietoa hyödynnetään hajautettujen järjestelmien sovelluksissa. Esineiden Internetin järjestelmien odotetaan skaalautuvan niin laajoiksi, ettei keskitetty, vertikaaliseen vuorovaikutukseen perustuva järjestelmähallinta ole enää käyttökelpoinen ratkaisu. Hajautettu hallinta lähellä tietoa tuottavia laitteita tuo etuja, kun paikallisesti sovelluksen suorituksessa otetaan huomioon toimintaympäristön tila ja voidaan reagoida dynaamisesti resurssien saatavuuteen. Hajautus Esineiden Internetin sovellusalustoilla edellyttää menetelmiä sekä laitteiden vertikaaliseen ja horisontaaliseen vuorovaikutukseen, että niiden dynaamisen osallistumisen mahdollistamiseksi sovelluksen suorittamisessa. Tässä työssä tutkittiin mobiiliagentti-teknologiaa hajautettujen sovellusten toteuttamiseen Esineiden Internet-ympäristössä. Työssä esitettiin resurssisuuntautunut arkkitehtuuri reaktiivisille mobiiliagenteille sekä ohjelmistokehys, joita käyttäen voidaan toteuttaa agenttipohjaisia hajautettuja sovelluksia. Ohjelmistokehys perustuu REST-arkkitehtuurimalliin, jonka pohjalta esitettiin yhdenmukainen rajapinta agenttien ja järjestelmäkomponenttien väliseen vuorovaikutukseen. Ohjelmistokehyksen osana toteutettiin kaksi mobiiliagentti-ohjelmistoalustaa resurssirajoitteisille sulautetuille laitteille. Työssä tarkasteltiin mobiiliagentti-pohjaisten Esineiden Internet-sovellusten energiatehokkuutta simuloinneilla sekä tosielämän kokeilla. Tarkastelun kohteeksi valittiin joukkoistettu mobiilihavainnointi sekä reunalaskennan ulottaminen resurssirajoitteisiin laitteisiin. Saadut tulokset osoittavat, että laitteiden energiankulutusta voidaan pienentää verrattuna aiemmin esitettyihin ratkaisuihin hyödyntämällä mobiiliagentteja tiedonkäsittelyyn laitteessa sekä laitteen toiminnan ohjaamiseen. Työssä esitetty resurssisuuntautunut mobiiliagenttiarkkitehtuuri sekä ohjelmistokehys edesauttavat mobiiliagentti-teknologian hyödyntämistä resurssirajoitteisissa sulautetuissa laitteissa. Tosielämän kokeista saadut tulokset osoittavat mobiiliagenttiteknologian hyötyjä hajautettujen sovellusten toteuttamisessa Esineiden Internetiin.
40

A secure mobile agent e-commerce protocol

Yu, Min-Chieh 09 December 2015 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / There are many advantages of mobile agent such as delegation of tasks, asynchronous processing, adaptable service in interfaces, and code shipping. Mobile agents can be utilized in many areas such as electronic commerce, information retrieval, network management, etc. The main problem with mobile agents is security. The three basic security design goals of a system are confidentiality, integrity, and availability. The goal of this thesis concerns the property of secure purchasing by mobile agents. First present Jalal's anonymous authentication protocol. Next, we construct our single mobile agent protocol based on Jalal's authentication technique. Also, we add some addition cryptography techniques to make the data more secure during its migration. Lastly, we build a multiple mobile agent protocol based on the single mobile agent protocol. Here, the multiple mobile agents are capable to make the decision and purchase the item for user.

Page generated in 0.0582 seconds