期刊文献+

可更新数据的数据完整性保护方法

Integrity protection of renewable data
下载PDF
导出
摘要 数据收集是移动Agent的一类重要应用,在多个领域的移动Agent应用系统中涉及到数据收集。由于移动Agent可能受到恶意主机攻击,如何保证收集数据的完整性是一个重要的安全问题。文中在分析移动Agent数据收集的安全性属性的基础上,提出了一个用于保证移动Agent在潜在恶意主机上访问时保护所收集数据的完整性安全协议。该协议能够实现数据的完整性验证与数据被收集的顺序无关,从而可以随机地访问主机,并且同一主机提交的数据可以自己更新,非常适合数据动态变化的应用系统。 Data collection is one kind of important applications of mobile Agent and gets involved in many areas of mobile Agent application system. Because the mobile agents could get the attacks from malicious hosts, how to protect the integrity of the collected data is a crucial issue. In this paper, a protocol to protect the integrity of the collected data, when mobile Agent was roaming through a set of potentially malicious hosts, was proposed based on the analysis of security properties for data collection of mobile Agent. The protocol can assure the integrity verification of the collected data regardless of the collecting order of each data segment. So the set of hosts can be visited randomly and can update their own data. The protocol is suitable for application system with dynamically changing data.
出处 《计算机应用》 CSCD 北大核心 2006年第9期2105-2108,共4页 journal of Computer Applications
基金 江苏省科技攻关计划资助项目(BE2003064)
关键词 安全性 数据完整性 移动AGENT Hash集 security data integrity mobile Agent Hash set
  • 相关文献

参考文献17

  • 1GRAY S, CYBENKO G, KOTZ D. D'agents: security in a multiplelanguage, mobile-agent system[ A]. Lecture Notes in Computer Science[C]. Berlin: Springer-Verlag, 1998, 1419:154-187.
  • 2SANDER T, TSCHUDIN C. Protecting mobile agents against malicious hosts[ A]. Lecture Notes in Computer Science LNCS[ C]. Berlin: Springer-Verlag, 1998, 1419:44-60.
  • 3HARRISON CG, CHESS DM, KERSHENBAUM A. Mobile agents:axe they a good idea? [ EB/OL]. http://www.eecs. harvard.edu/cs262/mobag.pdf.
  • 4FARMER W, GUTTMAN J, SWARUO V. Security for mobile agents: issues and requirements[ A]. Proceedings of the 19th National Information System Security Conference [ C]. Baltimore: MD,1996:591 -597.
  • 5BELLARE M, YEE B. Forward integrity for secure audit logs[ R].San Diego: Department of Computer Science and Engineering, University of California, 1997.
  • 6YEE B. A sanctuary for mobile agents[ R]. San Diego: Department of Computer Science and Engineering, University of California,1997.
  • 7LOUREIRO S, MOLVA R, PANNETRAT A. Secure data collection with updates[J]. Electronic Commerce Research, 2001, (1): 119- 130.
  • 8KARJOTH G, ASOKAN N, GULCUC C. Protecting the computation results of free-roaming agents[ J]. Lecture Notes in Computer Science, Springer- Verlag, 1998. 195 -207.
  • 9CORRADI A, MONTANARI R, STEFANELLI C. Mobile agents integrity in e-commerce application[ A]. Proceedings of the 19th IEEE International Conference on Distributed Computing Systems Workshop[ C]. Austin, Texas, IEEE Computer Society Press, 1999.59 -64.
  • 10ZHOU J, ONIEVA J, LOPEZ J. Analysis of a free roaming agent result-truncation defense scheme[ A]. Proceedings of 2004 IEEE Conference on Electronic Commerce[ C]. San Diego, California,IEEE Computer Society Press. 2004. 221 -226

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部