Mostrar el registro sencillo del ítem

dc.contributor.authorVenkateshwaran, K.
dc.contributor.authorMalviya, Anu
dc.contributor.authorDikshit, Utkarsha
dc.contributor.authorVenkatesan, S.
dc.date2015-06
dc.date.accessioned2020-04-30T08:19:40Z
dc.date.available2020-04-30T08:19:40Z
dc.identifier.issn1989-1660
dc.identifier.urihttps://reunir.unir.net/handle/123456789/10017
dc.description.abstractAgent can play a key role in bringing suitable cloud services to the customer based on their requirements. In agent based cloud computing, agent does negotiation, coordination, cooperation and collaboration on behalf of the customer to make the decisions in efficient manner. However the agent based cloud computing have some security issues like (a.) addition of malicious agent in the cloud environment which could demolish the process by attacking other agents, (b.) denial of service by creating flooding attacks on other involved agents. (c.) Some of the exceptions in the agent interaction protocol such as Not-Understood and Cancel_Meta protocol can be misused and may lead to terminating the connection of all the other agents participating in the negotiating services. Also, this paper proposes algorithms to solve these issues to ensure that there will be no intervention of any malicious activities during the agent interaction.es_ES
dc.language.isoenges_ES
dc.publisherInternational Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI)es_ES
dc.relation.ispartofseries;vol. 3, nº 3
dc.relation.urihttps://www.ijimai.org/journal/node/768es_ES
dc.rightsopenAccesses_ES
dc.subjectagentses_ES
dc.subjectcloud computinges_ES
dc.subjectsecurityes_ES
dc.subjectservice capabilityes_ES
dc.subjectIJIMAIes_ES
dc.titleSecurity Framework for Agent-Based Cloud Computinges_ES
dc.typearticlees_ES
reunir.tag~IJIMAIes_ES
dc.identifier.doihttp://dx.doi.org/10.9781/ijimai.2015.334


Ficheros en el ítem

Thumbnail

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem