期刊文献+

A Communication Security Protocol of Mobile Agent System

A Communication Security Protocol of Mobile Agent System
原文传递
导出
摘要 The security issues of mobile agent system have embarrassed its widespread implementation. The paper analyses communication security threats and countermeasures of mobile agent system and proposes a communication security protocol of mobile agent system. It provides multifactor authentication, encryption transmission, and integrity protection of mobile agent. The security issues of mobile agent system have embarrassed its widespread implementation. The paper analyses communication security threats and countermeasures of mobile agent system and proposes a communication security protocol of mobile agent system. It provides multifactor authentication, encryption transmission, and integrity protection of mobile agent.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2010年第2期117-120,共4页 武汉大学学报(自然科学英文版)
基金 Supported by the National Natural Science Foundation of China (60673071)
关键词 mobile agent communication security multifactorauthentication encryption transmission mobile agent communication security multifactorauthentication encryption transmission
  • 相关文献

参考文献2

二级参考文献39

  • 1WilliamStallings著 潇湘工作室译.网络安全要素--应用与标准[M].北京:人民邮电出版社,2000..
  • 2W Lugmayr. Mobile code, agents, and Java. 2000. http://www. infosys, tuwien, ac. at/Research/Agents/homepage. html.
  • 3W Jansen, T Karygiannis. NIST special piblications 800-19:Mobile agent security. National Institute of Standards and Technology, Tech Rep: MD208999, 1999.
  • 4W Jansen. Countermeasures for mobile agent security. Computer Communications, 2000, 23(10): 1667--1677.
  • 5R Wahbe, S Lucco, T E Anderson et al. Efficient software-based fault isolation. In: Proc of the 14th ACM Symposium on Operating Systems Principles. New York: ACM Press, 1993.203--216.
  • 6J K Ousterhout. Scripting: Higher-level programming for the 21st century. IEEE Computer, 1998, 31(3) : 23--30.
  • 7G C Necula, P Lee. Safe kernel extensions without run-time checking. In: Proc of the 2nd Symposium on Operating System Design and Implementation. Berkeley: USENIX Association,1996. 229--243.
  • 8N Islam, R Anand, T Jaeger et al. A flexible security system for using intemet content. IEEE Software, 1997, 14(5): 52--59.
  • 9D Chess, B Grosof, C Harrison et al. Itinerant agents for mobile computing. IEEE Personal Communications, 1995, 2(5): 34--49.
  • 10W Farmer, J Guttman, V Swamp. Security for mobile agents:Authentication and state appraisal. In: Proc of the 4th European Symposiumon Research in Computer Sectudty. Rome: Springer-Verlag, 1996. 118--130.

共引文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部