Key technology of hierarchical management by delegation for network based on absolute agent

被引:0
|
作者
Zhang, Yong [1 ]
Zhang, Deyun [1 ]
Zheng, Weibin [1 ]
Wu, Zhan [1 ]
机构
[1] Sch. of Electron. and Info. Eng., Xi'an Jiaotong Univ., Xi'an 710049, China
关键词
Absolute agent - Delegation - Elastic processing - Hierarchical network - Remote delegation service;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:802 / 805
相关论文
共 50 条
  • [1] Network management by delegation based on web technology
    Wang, Chenggui
    Shao, Junli
    Chen, Taiyi
    Dianxin Kexue/Telecommunications Science, 1999, 15 (10): : 16 - 18
  • [2] Delegation agent implementation for network management
    Suzuki, M
    Kiriha, Y
    Nakai, S
    IEICE TRANSACTIONS ON COMMUNICATIONS, 1997, E80B (06) : 900 - 906
  • [3] Building hierarchical network management system with mobile agent technology
    College of Computer, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
    不详
    Nanjing Youdian Daxue Xuebao (Ziran Kexue Ban), 2006, 3 (9-13+21):
  • [4] Generalized key delegation for hierarchical identity-based encryption
    Abdalla, Michel
    Kiltz, Eike
    Neven, Gregory
    COMPUTER SECURITY - ESORICS 2007, PROCEEDINGS, 2007, 4734 : 139 - 154
  • [5] Generalised key delegation for hierarchical identity-based encryption
    Abdalla, M.
    Kiltz, E.
    Neven, G.
    IET INFORMATION SECURITY, 2008, 2 (03) : 67 - 78
  • [6] Agent based bandwidth reduction for key management in hierarchical group communication
    Moulavi, M. Amir
    Parvar, H.
    2007 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS SOFTWARE & MIDDLEWARE, VOLS 1 AND 2, 2007, : 261 - +
  • [7] A key management based on multiple regression in hierarchical sensor network
    Kim, Mihui
    Doh, Inshil
    Chae, Kijoon
    INFORMATION SECURITY APPLICATIONS, 2006, 4298 : 267 - +
  • [8] Mobile-agent-based hierarchical network management model
    Zheng, Hong-Fang
    Guo, Feng
    Yuan, Zeng-Qiang
    Wang, Guang-Xing
    Dongbei Daxue Xuebao/Journal of Northeastern University, 2006, 27 (01): : 25 - 28
  • [9] Research on network management of mobile communication network based on agent technology
    Fu, Yan-Fang
    Cheng, Bing
    Tian, Peng-Hui
    Gao, Xiang
    Open Cybernetics and Systemics Journal, 2015, 9 (01): : 1453 - 1460
  • [10] Hierarchical identity-based encryption without key delegation in decryption
    Luo, Song
    Chen, Zhong
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2014, 5 (02) : 71 - 79