期刊文献+

一种适用于移动Agent系统的双向认证协议

A Two-way Certification Protocol Suited to Mobile Agent System
下载PDF
导出
摘要 移动Agent系统的安全问题一直是移动Agent技术走向实际应用的巨大障碍。以面向电子商务的移动Agent系统为背景,研究主机与主机的双向认证问题,提出一种适用于移动Agent系统的双向认证协议,并对协议的安全性能进行分析。性能分析表明,该协议具有较好的安全性。 The security problems of mobile agent system have been a huge obstacle of applying mobile agent technology. This paper studies two-way certification problem of host-to-host for the electronic commerce oriented prototype of mobile agent system, proposes a two-way certification protocol to suit to mobile agent system, and analyze the security of this protocol. The performance analysis shows that protocol has better security.
作者 李陶深 谢铭
出处 《计算机与数字工程》 2008年第10期145-148,共4页 Computer & Digital Engineering
基金 广西科技攻关项目(编号:桂科攻关0385001)资助 广西留学回国人员科学基金项目(编号:桂科回0342001)资助
关键词 移动AGENT 安全 认证协议 证书 mobile agent, security, certification protocol, certificate
  • 相关文献

参考文献6

  • 1万燕,孙永强.一个安全的移动代理系统的双向认证机制[J].计算机应用与软件,2004,21(10):93-95. 被引量:3
  • 2C. Kaufman, R. Perlman, M. Speciner. Network Security:Private Communication in a Public Word, Second Edition[M]. Prentice Hall PTR,2002
  • 3A. Kahate. Cryptography and Network Security [M].. McGraw Hill Companies. 2003
  • 4W Farmer,J Guttman, V Swarup. Security for mobile agents:authentication and state appraisal[C]. Proc. of the Computer Security--ESORICS'96, Lecture Notes in Computer Science 1146. Berlin: Springer Verlag, 1996:118-130
  • 5谭湘,顾毓清,包崇明.一种用于移动Agent数据保护的机制[J].软件学报,2005,16(3):477-484. 被引量:8
  • 6G. Vigna. Cryptographic Traces for Mobile Agents [C]. Lecture Notes in Computer Science 1419. Heidelberg: Springer-Verlag, 1998:137-153

二级参考文献11

  • 1Jansen W. Countermeasures for mobile Agent security. Computer Communications, 2000,23(10):1667-1677.
  • 2Corradi A, Montanar R. Mobile Agent protection in the Internet environment. In: Gibson RM, ed. Proc. of the 23th Annual Int'l Computer Software and Applications Conf. Los Alamitos: IEEE Computer Society Press, 1999. 80-85.
  • 3Corradi A, Cremonini M. Mobile Agents integrity for electronic commerce applications. Information Systems, 1999,24(6): 519-533.
  • 4Karjoth G, Asokan N, Glc C. Protecting the computation results of free-roaming Agents. In: Rothermel K, Hohl F, eds. Mobile Agents: 2nd Int'l Workshop. London: Springer-Verlag, 1998. 195-207.
  • 5Cheng JSL, Victor KW. Defenses against the truncation of computation results of free-roaming Agents. In: Deng RH, Qing SH, Bao F, Zhou JY, eds. Information and Communications Security. London: Springer-Verlag, 2002. 1-12.
  • 6Wilhelm G, Staamann M. A pessimistic approach to trust in mobile Agent platforms. IEEE Internet Computing, 2000,4(5):40-48.
  • 7Stalling W. Network Security Essentials: Applications and Standards. New York: Prentice Hall, 1999. 119-123.
  • 8Karjoth G, Lange DB, Oshima M. A security model for aglets. IEEE Internet Computing, 1997,1(4):68-77.
  • 9W.Diffie,P.C.Van Oorschot,and M.J.Wiener,Authentication and Authenticated Key Exchanges,Designs,Codes and Cryptography,v.2,1992.
  • 10W.M.Farmer,J.D.Guttman,V.Swarup,Security for Mobile Agents:Issues and Requirements,In Proc.19th National Information Systems Security Conference(NISSC 96),Baltimore,USA,1996,591-596.

共引文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部