期刊文献+

一种移动agent系统的认证模型

One authentication model for the mobile agent systems
原文传递
导出
摘要 本文提出了一个移动agent系统的认证模型设计,模型支持基于历史的安全策略的定义和实施,允许主机根据agent的过去行为决定它的活动的认证。该认证模型是健壮且高效的,可以避免恶意agent的非法攻击。
出处 《信息安全与通信保密》 2005年第6期78-80,共3页 Information Security and Communications Privacy
  • 相关文献

参考文献7

  • 1M.Hauswinrth,C.Kerer and R.Kurmanowytsch,“A Secure Execution Framework for Java”[A].in Proceedings of the 7th ACM Conference on Computer and Communications Security [C],2000,43-52.
  • 2G.Edjlali,A.Acharya and V.Chaudhary.“History-based Access Control for Mobile Code”[A].in Proceedings of the 5th Conference on Computer & Commmunications Security [C],1998.
  • 3N.Dulay,E.Lupu,M.Sloman,N.Damianou,“A Policy Deployment Model for the ponder Language”[A],in proceedings of the IEEE/IFIP International Symposium on Integrated Network Management[C].2001.
  • 4R.Montanari and G.Tonti,“A Policy-Based Infrastructure for the Dynamic Control of Agent Mobility”[A],in Proceedings of the 3rd IEEE International Workshop on Policies for Distributed Systems and Networks[C],2002.
  • 5J.Vitek and C.Bryce,“The JavaSeal Mobile Agent Kernel”[A],in the Proceedings of the Joint Symposium on Agent Systems and Applications and the Third Symposium on Mobile Agents[C],1999.
  • 6C.N.Ribeiro,A.Z ú quete,P.Ferreira and P.Guedes,“SPL:An Access Control Language for Security Policies with Complex Constraints”[A],in Network and Distributed System Security Symposium,NDSS’01[A],2001.
  • 7D.F.C.Brewer and M.J.Nash,“The Chinese Wall Security Policy”[J],IEEE Symposium on Research in Security and Privacy,1989,206-214.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部