期刊文献+

一种新的远端移动代理的安全保护机制 被引量:1

A Novel Scheme on Protection for Remote Mobile Agent
下载PDF
导出
摘要 在目前的移动代理系统中,保护主机免受恶意代理攻击的研究已经取得了很大的进展,而对于远端移动代理免受恶意主机攻击的问题,尚没有很好的解决方案.文中提出了一种利用JavaC ard为远端移动代理,提供安全的执行环境的保护机制,并在此基础上引入了基于布尔代数运算的代码分割算法以提高本方案的安全性.实验结果证明该方案具有较好的安全性和健壮性. In current mobile agent systems, the research of protecting a host from possibly malicious mobile agents has made great progress, but the problem of protecting the remote agent from malicious hosts left unsolved. This paper puts forward a scheme that uses JavaCard to provide a secure execution environment for remote mobile agent. And a Boolean operation based partition algorithm is introduced to improve the security. The experiment system model is established and the presented approach shows very good security and robustness under all the experimental conditions.
出处 《武汉理工大学学报(交通科学与工程版)》 2006年第1期88-91,共4页 Journal of Wuhan University of Technology(Transportation Science & Engineering)
基金 国家自然科学基金(批准号:60272024) 河南省自然科学基金项目资助(批准号:0411014100)
关键词 移动代理 JAVA卡 安全 布尔运算 mobile aagent JavaCard security Boolean operation
  • 相关文献

参考文献5

二级参考文献19

  • 1Gong L,Proc.USENIX Symposium on Internet Technologies and Systems,1997年
  • 2Wilhelm U.G., Staamann S.M., Buttyan L.. A pessimistic approach to trust in mobile agent platforms. IEEE Computing, 2000, 40~48
  • 3Fritz Hohl. A model of attacks of malicious hosts against mobile agents. In: Proceedings of the 4th Workshop on Mobile Object Systems(MOS'98): Secure Internet Mobile Computations, 1998
  • 4Shieh Shiuh-Pyng, Lin Chern-Tang, Wu Shianyow. Optimal assignment of mobile agents for software authorization and protection. Computer Communications, 1999, 22(6): 46~55
  • 5Farmer W.M., Gutman J.D., Swarup V.. Security for mobile agents: Authentication and state appraisal. In: Proceedings of the 4th European Symposium on Research in Computer Security, Rome, Italy, 1996, 118~130
  • 6He Yan-Xiang, Chen Shen-Meng. Design and Applications of Agent and Multi-Agent System. Wuhan: Wuhan University Press, 2001(in Chinese)(何炎祥,陈莘萌. Agent和多Agent系统的设计和应用. 武汉:武汉大学出版社,2001)
  • 7Zhang Yun-Yong. Mobile Agent and Its Application. Beijing: Tsinghua University Press, 2002(in Chinese)(张云勇. 移动Agent及其应用. 北京:清华大学出版社,2002)
  • 8Bruce Schneier. Wu Shi-Xiong, Zhu Shi-Xiong, Zhang Wen-Zheng et al. translate. Applied Cryptography: Protocols, Algorithms and Source Code in C. Second Edition. Beijing: China Machine Press, 2000(in Chinese)(Bruce Schneier著.吴世忠,祝世雄,张文政等译. 应用密码学--协议、算法与C源程序. 北京:机械工业出版社,2000)
  • 9Li Gong. Wang Yun-Kai, Shi Lei, Cao Shao-Wen, Kang Yong translate. Java 2 Platform Security Technology--Architecture, API Design and Realization. Beijing: China Machine Press, 2001(in Chinese)(Li Gong 著.王运凯,石磊,曹少文,康拥译. Java 2平台安全技术--结构、API设计和实现. 北京:机械工业出版社, 2001)
  • 10Chess D.. Security issues in mobile code systems. In: Giovanni Vigna ed.. Mobile Agent Security, LNCS 1419, Springer-Verlag, 1998, 1~14

共引文献30

同被引文献7

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部