期刊文献+

限制恶意主机执行时间的安全协议 被引量:2

A Protocol of Limiting the Execution Time of Mobile Agents on Malicious Hosts
下载PDF
导出
摘要 针对文献[1]提出的使用源主机检测主机执行移动代理时间的安全协议的不足,进行了改进。通过运行在可信主机上的协作Agent,限制移动Agent在主机上的运行时间,设计了一个安全有效的协议,以防止恶意主机对Agent代码和数据的篡改以及拒绝服务攻击。 O.Esparza introduced a protocol of using the origin host to verify if there are incoherences in the execution or transmission times in the hosts. This paper presents an improved protocol to offset the inadequacies of O,Esparza's protocol. By using the perfect cooperation of a sedentary agent running on a trusted third host, it aims to design a new secure protocol, which can detect manipulation attacks performed during the agent's execution and the attack of denial of service.
出处 《计算机工程》 CAS CSCD 北大核心 2006年第2期167-169,共3页 Computer Engineering
关键词 移动代理安全 恶意主机 拒绝服务 Mobile agent security Malicious hosts Denial of service
  • 相关文献

参考文献8

  • 1Esparza O, Sorlano M, Mufioz J E, et al. A Protocol for Detecting Malicious Hosts Based on Eimiting the Execution Time of Mobile Agents[C]. Eighth IEEE International Symposium on Computers and Communications, 2003.
  • 2Abdelmorhit E R, Samuel P, Hanifa B. Secure Protocol in Mobile Agent Environment[C]. Canadian Conference on Electrical and Computer Engineering, 2003-05.
  • 3Sander T, Tschudin C F. Protecting Mobile Agents Against Malicious Hosts[M]. Mobile Agents and Security, LNCS, Springer-Verlag, 1998, 1419.
  • 4Hohl F. A Framework to Protect Mobile Agents by Using Reference States[C]. Proceedings 20^th International Conference on Distributed Computing Systems, IEEE Computer Society, California,2000:410-417.
  • 5Kamik N M, Tripathi A R. A Security Architecture for Mobile Agents in Ajanta[C]. Proceedings 20^th International Conference on Distributed Computing Systems, IEEE Computer Society, California, 2000:402-409.
  • 6Hohl F. Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts[M]. Mobile Agents and Security, LNCS,Springer-Verlag, 1998, 1419.
  • 7Mir J, Borrell J. Protecting General Flexible Itineraries of Mobile Agents[M]. Information Security and Cryptology, LNCS, Springer-Verlag, 2001, 2288.
  • 8Vigna G. Cryptographic Traces for Mobile Agents[M]. Mobile Agents and Security, LNCS, Springer-Verlag, 1998, 1419.

同被引文献1

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部