期刊文献+

基于信任管理模型的移动Agent安全机制研究 被引量:4

Secure Mechanism Research of Mobile Agent Based on Trust Management Model
下载PDF
导出
摘要 针对移动Agent系统的安全问题,分析了信任管理模型的概念及其形式化定义。基于可信计算的相关思想,在传统安全管理的基础上融合了基于动态信任管理模型的安全体系结构并对相关关键算法进行了设计,同时与传统的安全性能进行了对比和分析。 This paper presents the notion of trust management model and its formalization for secure mobile agent systems. Based .on the idea of trusted computing,dynamic trust management model based architecture and interrelated key algorithm has been successfully designed and integrated with traditional security mechanism. Its performance is also analyzed and contrasted with traditional security.
出处 《广西师范大学学报(自然科学版)》 CAS 北大核心 2008年第2期114-117,共4页 Journal of Guangxi Normal University:Natural Science Edition
基金 国家863计划基金资助项目(2006AA01Z442)
关键词 信任管理模型 移动AGENT 可信计算 trust management model mobile agent trusted computing
  • 相关文献

参考文献9

  • 1JANSEN W A. Countermeasures for mobile agent security[J]. Computer Communications, 2000,23 (17) : 1667 - 1676.
  • 2KARNIK N M,TRIPATHI A R. Security in the ajanta mobile agent system[J]. Software Practice and Experience, 2001,31 (4) : 301-329.
  • 3VARADHARAJAN V. Security enhanced mobile agents[C]//Proeeedings of 7th ACM Conference on Computer and Communications Security, New York :ACM Press ,2000: 200-209.
  • 4吴杰宏,常桂然.基于时间核查和代码混乱的移动代理安全方案[J].广西师范大学学报(自然科学版),2008,26(1):253-256. 被引量:1
  • 5WU Xiao-ping,SHEN Zhi-dong,ZHANG Huan-guo. The mobile agent security enhanced by trusted computing technology[C]//The 2nd International Conference on Wireless Communications, Networking and Mobile Computing, Washington DC :IEEE Press, 2006:1-4.
  • 6LIN Ching,VARADHARAJAN V. Trust relationship in mobile agents a reflexive approach[C]//Proceedings of the First International Conference of Agent-Based Technologies and Systems. [S, l. ]:[s. n. ] ,2003:81-88.
  • 7TAN H K,MOREAU L. Trust relationships in a mobile agent system[C]//PICCO G P. Proceedings of Fifth IEEE International Conference on Mobile Agents :LNCS volume 2240. Berlin:Springer-Verlag,2001..15-30.
  • 8Trusted Computing Group. TCG specification architecture overview,specification revision 1.2[EB/OL]. 2004[2008-01-25]. http : //www. trustedeomputinggroup, org/specs/TPM/.
  • 9LIN Ching, VARADHARAJAN V,WANG Yan ,et al. Trust enhanced security for mobile agents [C]//Proceedings of the Seventh IEEE International Conference on E-Commerce Technology. Washington DC:IEEE Press,2005:231.

二级参考文献8

  • 1陈志,王汝传.移动代理网络管理模型的安全性研究[J].南京邮电学院学报(自然科学版),2004,24(2):70-75. 被引量:6
  • 2ESPARZA O ,SORIANO M,MUNOZ J L,et al. Implementation and performance evaluation of protocol for detecting suspicious hosts [C]//Mobile Agents for Telecommunication Applications (MATA'03),volume 2881 of LNCS. Morocco t Springer-Verlag, 2003 :286-296.
  • 3VIGNA G. Cryptographic traces for mobile agents [C]//VIGNA G. Mobile Agents and Security,Volume 1419 of LNCS ,State of the Art Survey. Heidelberg :Springer-Verlag, 1998 : 137-153.
  • 4YOUNG A ,YUNG M. Sliding encryption:A cryptographic tool for mobile agents[C]//Proc of the 4th Int'l Work shop ,FSE'97. Berlin :Springer-Verlag, 1997:230-240.
  • 5SANDER T. On the cryptographic protection of mobile code[C]//Work shop on Mobile Agents and Security,Berkeley :Springer-Verlag, 1997 : 1-27.
  • 6FARMER W M,et al. Security for mobile agents:Authentication and state appraisal[C]//Proc of the 4th European Symposium on Research in Computer Security (ESOR ICS). New York:Springer-Verlag, 1996 : 118 - 130.
  • 7HOU T W,CHEN H Y,TSAI M H. Three control flow obfuscation methods for java software[J].IEE Proc-Software, 2006,153 (2) : 80-86.
  • 8王汝传,孙开翠,张登银,杨立扬.基于JavaCard的移动代理保护的研究[J].计算机学报,2004,27(4):492-499. 被引量:8

同被引文献19

  • 1徐小龙,王汝传.移动代理安全机制的研究[J].计算机工程与应用,2004,40(22):6-9. 被引量:6
  • 2樊静淳.一个移动Agent安全旅行协议[J].微计算机信息,2005,21(12X):72-74. 被引量:4
  • 3魏巍,刘弘.基于关系网模型的Agent联盟形成策略[J].计算机应用研究,2006,23(10):41-43. 被引量:6
  • 4胡鹏,袁世忠.基于间隔检测和信誉度的移动Agent安全机制[J].计算机应用与软件,2006,23(11):129-131. 被引量:1
  • 5整塑海 等.葶于移动agent的电子商务安全框架研究.科学信息,2007,(2).
  • 6赵淑海 等.基于移动Agent的电子商务安全框架研究.科学信息,2007,(2).
  • 7IBM Tokyo Research Laboratory. Aglets community[OL], http:// www. aglets. org.
  • 8Thomas Beth, Malte Borehering, Birgit Klein. Valuation of Trust in Open Networks [ C ]//Proceedings of the Third European Symposium Research in Computer Security. London, 1994:3 - 18.
  • 9Audun Josang, Tyrone Grandison. Conditional Inference in Subjective Logic[ C ]//Proceedings of the Sixth International Conference of Information Fusion. Australia,2003:471 -478.
  • 10He R, Niu JW, Zhang GW. CBTM: A trust model with uncertainty quantification and reasoning for pervasive computing [ M ]. Berlin: Springer,2005.

引证文献4

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部