期刊文献+

引入CA机制的移动网络安全传输协议模型

A Model of Mobile Network Security Transfer Protocol Based on CA
下载PDF
导出
摘要 安全性是移动Agent系统应用的关键问题,借鉴电子商务安全解决方案,本文在对移动Agent的安全问题及研究现状的分析基础上,讨论了一种引入CA作为第三方可信主机,由CA完成公钥的分发、管理和验证服务的移动Agent安全传输协议模型,并给出了其在Aglets平台上的实现方法。 Security is the key issue of Mobile Agent System,from ecommerce security solutions,in this paper, based on the security issues and the research status analysis of the mobile Agent, the introduction of CA as a credible third - party host is discussed, the distribution and management of public key.and the model of certification services and security protocol in mobile Agent Transfer are completed by CA, and the method is given on Aglets platform.
作者 王万群
出处 《煤炭技术》 CAS 北大核心 2009年第10期166-168,共3页 Coal Technology
关键词 移动AGENT 安全协议 CA机制 Aglets平台 mobile agent security protocol model MASTP Aglets
  • 相关文献

参考文献5

二级参考文献21

  • 1王治,亢建波,刘伟达.基于多Agent的组织决策支持系统(ODSS)的设计与研究[J].微计算机信息,2005,21(1):178-180. 被引量:12
  • 2Chess D.security Issues in Mobile Code Systems[C].In:Giovanni Vigna ed.Mobile Agent Security,LNCS 1419,Springer, 1998:1~14
  • 3N M Karnik,A R Tripathi.Design Issues in Mobile Agent Programming Systems. IEEE Concurrency,1998;6(3):52~61
  • 4UWE G WILHELM,SEBASTIAN M STAAMANN,LEVENTE BUTTYAN.A Pessimistic Approach to Trust in Mobile Agent Platforms[J].IEEE COMPUTING, 2000-09: 40~48
  • 5Martin Schaaf,Frank Maure. Integrating Java and CORBA:A Programmer's Perspective[J].IEEE INTERNET COMPUTING,2001-01:72~78
  • 6Wang X F,Yi X,Lam K Y.Secure Information Agent for Intemet Trading[C].In:11th Australian Joint Conference on Artificial Intelligence'98, Brisban, Australia: Springer-Verlag Publishers, 1998; 1544:183~194
  • 7Wilhelm,U.G.; Staamann,S.; Buttyàn,L.Introducing trusted third parties to the mobile agent paradigm.In:J.Vitek and C.Jensen (Eds.),Secure Internet Programming.Security Issues for Mobile and Distributed Objects,pp.471-491.Springer-Verlag,1999.
  • 8Hohl,F.An Approach to Solve the Problem of Malicious Hosts in Mobile Agent Systems.In:Institute of Parallel and Distributed High-Performance Systems (IPVR),Technical Report Nr.03/97,Faculty of Informatics,University of Stuttgart,Germany,1997.
  • 9Hohl,F.Time Limited Blackbox Security:Protecting Mobile Agents From Malicious Hosts.In:G.Vigna (Ed.):Mobile Agents and Security,pp.92-113.Springer-Verlag,1998.
  • 10JANSEN W A. Countermeasures for mobile agent security[J]. Computer Communications, 2000,23 (17) : 1667 - 1676.

共引文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部