期刊文献+

基于JavaCard的移动代理系统安全性研究 被引量:1

Research on Security of JavaCard based Mobile Agent System
下载PDF
导出
摘要 With wide and increasing range applications of mobile agent technology, the security problem has gottenmore and more focus. This paper discusses the security problems that the mobile agent system faces with at presentand the existing protesting schemes for it. Then a solving method based on JavaCard is proposed to protect mobile a-gents. And a feasible solving method is also provided to solve the security problems of JavaCard itself. With wide and increasing range applications of mobile agent technology, the security problem has gotten more and more focus. This paper discusses the security problems that the mobile agent system faces with at present and the existing protesting schemes for it. Then a solving method based on JavaCard is proposed to protect mobile a. gents. And a feasible solving method is also provided to solve the security problems of JavaCard itself.
出处 《计算机科学》 CSCD 北大核心 2003年第8期112-113,116,共3页 Computer Science
基金 国家自然科学基金(编号60173037) 江苏省自然科学基金(BK2001123) 江苏省计算机信息重点实验室基金(kjs01025) 中兴研究基金
关键词 移动代理系统 安全性 程序代码 JAVACARD 计算机程序 Mobile agent, JavaCard,TPE, Security
  • 相关文献

参考文献8

  • 1朱向华,万燕,孙永强.移动代理系统的安全机制[J].计算机工程,2001,27(1):137-138. 被引量:16
  • 2丁建国,柳惠琳,陈涵生,白英彩.移动Agent的一种安全认证机制[J].计算机工程,2001,27(2):74-75. 被引量:20
  • 3李增智,李钢,韩冬,王志文.智能卡的新发展——JavaCard技术综述[J].计算机科学,2001,28(7):16-18. 被引量:4
  • 4Hohl F. A Protocol to Detect Malicious Hosts Attacks by Using Reference States: [Technical Report Nr. 09/99]. Faculty of Inforrustics, University of Stuttgart, Germany, 1999.
  • 5Vigna G. Cryptographic Traces for Mobile Agents. in Mobile Agents and Security Lecture Notes in Computer Science, SpringerVerlag, June 1998.
  • 6Sander T, Tschudin C F. Towards Mobile Cryptography: [Technical Report 97-049]. International Computer Science lnstitude, Berkeley, 1997.
  • 7Hold F. Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts. In: Giovanni Vigna, ed. Mobile Agents and Security, LNCS 1419,Springer, 1998. 44~60.
  • 8Wilhelm U O,Staamann S M,Buttyan L . A Pessimistic Approach to Trust in Mobile Agent Platforms. IEEE Internet Computing, September/October 2000.

二级参考文献10

  • 1[1]Harrison C G, Chess D M. Mobile Agent: Are They Good Idea?IBM Research Report,1995
  • 2[2]David K, Robert S G. Mobile Agents and the Future of the Internet. ACM Operating System Review, 1999-08:7-13
  • 3[3]Sander T, Christian F T. Mobile Agent and Security. Spriner Verlag Lecture Notes in Computer Science #1419, 1998-06
  • 4[4]Tripathi A R, Karnik N M. Protected Resource Access for Mobile Agent-based Distributed Computing. Proceedings of the 1998 ICPP Workshop on Wireless Networks and Mobile Computing.IEEE Computer Society, 1998-08: 144-153
  • 5[5]Greenberg M S, Byington L C, Harper D G. Mobile Agents and Security. IEEE Communications Magazine, 1998, 36(7): 76-85
  • 6[1]Vitek J, Serrano M, Thanos D. Security and Communication in Mobile Object Systems. Mobile Object Systems-Towards the Programmable Internet. MOS'96, 1996-07
  • 7[2]Goldberg I.Wagner D, Thomas R et al. A Secure Environment for Untrusted Helper Application. In Proceedings of the 6th Usenix Security Symposium,San Jose,ca., 1996-07
  • 8[3]Lindholm T, Yellin F. The Java Virtual Machine Specification. Adison-Wesley,1997
  • 9[4]Necula G C, Lee P. Safe, Untrusted Agents Using Proof-carrying Code. Submitted for an LNCS Special Volume on Mobile Agent Security, 1997-10
  • 10[5]Wahbe R, Lucco S, Anderson T E et al. Efficient Software-based Fault Isolation. In Proc. 14th ACM Symp. on Operating System Principles,1993

共引文献36

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部