期刊文献+

改进的基于层次化身份加密的移动Agent安全方案

An Improved Security Scheme for Mobile Agents Based on HIBE
原文传递
导出
摘要 移动Agent的安全性是限制其广泛应用的一个重要因素。论文提出了一种改进的基于层次化身份加密的移动Agent安全方案,更简单、高效地实现了分布式环境下移动Agent与主机的相互认证,同时实现了对移动Agent的路径追踪,为移动Agent系统提供了可靠的安全性和稳健性保证,具有较高的实用价值。 Security is an important factor in the application of mobile agent technology. This paper presents an improved security scheme for mobile agents based on Hierarchical Identity-based encryption(HIBE). Mobile agents' mutual authentication with the host could be implemented easily and efficiently in the distributed environment by the improved security scheme. Meanwhile, the path tracking of mobile agents is also realized. The improved security scheme provides a reliable assurance of security and robustness, thus is of high practical value.
出处 《信息安全与通信保密》 2009年第7期105-107,共3页 Information Security and Communications Privacy
关键词 移动AGENT 层次化身份加密 安全性 身份认证 mobile Agent hierarchical identity-based encryption(HIBE) security authentication
  • 相关文献

参考文献9

  • 1CHESS D. Security issues in mobile code systems[A]. Giovanni Vigna(ED), Mobile Agent Security, LNCS 1419[C]. Springer, 1998.
  • 2谭湘,顾毓清,包崇明.移动agent系统安全性研究综述[J].计算机研究与发展,2003,40(7):984-993. 被引量:18
  • 3王汝传,胡涛,徐小龙.移动代理安全性研究综述[J].重庆邮电学院学报(自然科学版),2004,16(3):81-86. 被引量:7
  • 4A Shamir. Identity-based cryptosystems and signature schemes[C]. //In: Blakley G T, Chaum D.LNSC 196. Berlin: Springer-Verlag, 1984: 47-53.
  • 5Saxena A, Soh B. An Authentication Protocol for Mobile Agents Using Bilinear[EB/OL]. http //eprint. iacr.org/2007/272.pdf 2005.
  • 6Malek B, Miri A. A new scheme for securing mobile agents[J]. IEEE, 2004 Electrical and Computer Engineering, 2004. Canadian Conference on.
  • 7Gentry C, Sliverberg A. Hierarchical ID-based cryptography[C]. // Advances in Cryptology- Aisacryp'02. LNCS 2501. Heidellberg: Springer- Verlag, 2002: 548-566.
  • 8Boneh D, Boyen X, Goh EJ. Hierarchical identity based encryption with constant size ciphertext[C]. / / Advances in Cryptology-Eurocrypt'05. LNCS 3494. Heidellberg: Springer-Verlag, 2005: 440-456.
  • 9侍伟敏.PKI、IBE关键技术的研究及应用[D].北京:北京邮电大学,2006.

二级参考文献41

  • 1W Lugmayr. Mobile code, agents, and Java. 2000. http://www. infosys, tuwien, ac. at/Research/Agents/homepage. html.
  • 2W Jansen, T Karygiannis. NIST special piblications 800-19:Mobile agent security. National Institute of Standards and Technology, Tech Rep: MD208999, 1999.
  • 3W Jansen. Countermeasures for mobile agent security. Computer Communications, 2000, 23(10): 1667--1677.
  • 4R Wahbe, S Lucco, T E Anderson et al. Efficient software-based fault isolation. In: Proc of the 14th ACM Symposium on Operating Systems Principles. New York: ACM Press, 1993.203--216.
  • 5J K Ousterhout. Scripting: Higher-level programming for the 21st century. IEEE Computer, 1998, 31(3) : 23--30.
  • 6G C Necula, P Lee. Safe kernel extensions without run-time checking. In: Proc of the 2nd Symposium on Operating System Design and Implementation. Berkeley: USENIX Association,1996. 229--243.
  • 7N Islam, R Anand, T Jaeger et al. A flexible security system for using intemet content. IEEE Software, 1997, 14(5): 52--59.
  • 8D Chess, B Grosof, C Harrison et al. Itinerant agents for mobile computing. IEEE Personal Communications, 1995, 2(5): 34--49.
  • 9W Farmer, J Guttman, V Swamp. Security for mobile agents:Authentication and state appraisal. In: Proc of the 4th European Symposiumon Research in Computer Sectudty. Rome: Springer-Verlag, 1996. 118--130.
  • 10R Sekar, C R Ramakrishnan. Model-carrying code (MCC): A new paradigm for mobile-code security. In: Proc of the 2001 Workshop on New Security Paradigms. New York: ACM Press,2001. 23--30.

共引文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部