期刊文献+

面向大规模网络应用的移动主体系统安全机制

A Mobile Agent System Security Mechanism for Large Scale Network Applications
下载PDF
导出
摘要 从系统整体安全的角度,提出一种面向大规模网络应用的移动主体系统安全机制方案。该方案采用基于混合加密的双向认证技术解决移动主体系统的局部安全问题,通过各级移动主体安全管理平台完成密钥的分配与管理,并对移动主体的迁移进行合理的任务分配与调度,通过任务传递模式解决移动主体的跨网段安全迁移问题,这些措施较为全面的解决了当前移动主体系统的整体安全问题。而且由于采用层次化的系统结构和管理模式,使得该方案非常适合当前面向大规模网络的应用开发。 This paper presents a mobile agent system security mechanism for large scale network applications In this mechanism, we use a bidirectional authentication technology based on mixed encryption to resolve the mobile agent system local security problem. Mobile Agent Security Management Platforms (MASMP) working on different levels is applied to deal with the key distribution and management and control the emigration and task attribution of mobile agents. In order to resolve the problem of mobile agent security transference from one network to another, a task transfer model based on the credibility between two conjoint level MASMPs is designed. All these plans together resolve the mobile agent system security problem well. Because of its hiberarchy system structure and management model, this mechanism is very suit for large scale network applications,
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2007年第6期1202-1205,1218,共5页 Journal of University of Electronic Science and Technology of China
基金 福建省自然科学基金(2006J0222)
关键词 身份认证 移动主体 网络应用 安全机制 identity authorization mobile agent network applications security mechanism
  • 相关文献

参考文献10

  • 1PHAM V A, KARMOUCH A. Mobile software agents: An overview[J]. IEEE Communications Magazine, 1998, 36(7): 26-37.
  • 2GREENBERG M S, BYINGTON L C, HARPER D G. Mobile agents and security [J]. IEEE Communications Magazine, 1998, 36(7): 76-85.
  • 3TARDO J, VALENTE L. Mobile agent security and telescript[C]//In: Proceedings of COMPCON Spring '96. Santa Clara: IEEE Computer Society press, 1996.
  • 4WALSH T, PACIOREK N, WONG D. Security and reliability in Concordia TM[C]//Proceedings of the Thirty-First Hawaii International Conference on System Sciences. Hawaii: [s.n.], 1998.
  • 5JANSEN W A. Countermeasures for mobile agent security [J]. Computer Communications, 2000, 23(17): 1667-1676.
  • 6KARJOTH G, LANGE D, OSHIMA M. A security model for aglets[J]. IEEE Internet Computing, 1997, 1(4): 68-77.
  • 7王汝传,徐小龙,郑晓燕,孙知信.移动代理安全机制模型的研究[J].计算机学报,2002,25(12):1294-1301. 被引量:53
  • 8杨博,杨鲲,刘大有.面向网络管理的移动主体安全设施[J].软件学报,2003,14(10):1761-1767. 被引量:7
  • 9狄晓龙,庄镇泉,张仕山.移动智能体技术的安全机制研究[J].小型微型计算机系统,2004,25(4):493-496. 被引量:2
  • 10GONG Li.Java2平台安全技术-结构、API设计和实现[M].机械工业出版社,2000.

二级参考文献16

  • 1[1]Fuggetta A, Picco G P and Vigna G. Understanding code mobility[J]. IEEE Transactions on Software Engineering, 1998, 24(5):342~361.
  • 2[2]Dejan S. Milojicic, Markus Breugst, Ingo Busse, MASIF: The OMG mobile agent system interoperability facility[A]. Kurt Rothermel, Fritz Hohl(Eds.): Mobile Agents, Second International Workshop[C]. MA'98, Stuttgart, Germany, September 1998, Proceedings. Lecture Notes in Computer Science, Vol. 1477, Springer, 1999, 50~67.
  • 3[3]Steven J. Fritzinger, Marianne Mueller, Sun Microsystem,Inc. Java security[EB/OL]. URL:http://java.sun.com/security/whitepaper.ps.
  • 4[4]Joann J. Ordille. When agents roam, who can you trust?[C]. Proceedings of the First Conference on Emerging Technologies and Applications in Communications, Portland, 1996, 188 ~ 191.
  • 5[5]Sander T and Tshudin C. Towards mobile cryptography[C].Proceedings of the IEEE Symposium on Security and Privacy, California, U.S.A, 1998, 215~224.
  • 6[6]Necula G and Lee P. Safe kernel extensions without run-time checking[C]. Proceedings of the 2nd Symposium on Operating System Design and Implementation (OSDI '96), Seattle, Washington, USA, 1996,229~243.
  • 7Chess D. Security Issues in mobile code systems. In: Vigna G ed. Mobile Agent Security, 1998. 1-14
  • 8Karnik N M, Tripathi A R. Design issues in mobile agent programming systems. IEEE Concurrency, 1998, 6(3) :52-61
  • 9Wilhelm U G, Saamann S M, Buttyan L. A pessimistic approach to trust in mobile agent platforms. IEEE Ccmputing, 2000,10(4) :40-48
  • 10Martin Schaaf, Frank Maure. Integrating Java and CORBA: A programmer' s perspective. IEEE Internet Computing, 2001,7 (1) :72-78

共引文献59

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部