期刊文献+

一种移动代理安全通信的方法 被引量:1

A Method of Safety Communication for Mobile Agent
下载PDF
导出
摘要 随着网络技术的发展,移动代理技术的应用前景越来越广阔,与此同时,其安全性问题也越来越重要。文章在分析移动代理安全隐患的基础上,提出了一种基于移动代理代码身份认证和处理结果加密的方法对移动代理及其携带的数据和处理结果提供保护。 With development of network technology,the application systems of mobile agent are more and more exten-siver.At the same time ,their securities are also more and more important .Based on analyzing the hidden security trou-bles and dangers,this article gives a solution based on authentication of mobilt agent code and public key cryptology,which is used to protect mobile agent code and its result.
出处 《计算机工程与应用》 CSCD 北大核心 2003年第36期15-16,27,共3页 Computer Engineering and Applications
基金 国家自然科学基金(编号:90104028) 国家海外杰出青年自然科学基金(编号:69928201)
关键词 移动代理 认证 公开密码体制 安全通信 计算机网络 数据传输 Mobile agent ,Authentication,Public key cryptology
  • 相关文献

参考文献1

二级参考文献9

  • 1Chess D. Security Issues in mobile code systems. In: Vigna G ed. Mobile Agent Security, 1998. 1-14
  • 2Karnik N M, Tripathi A R. Design issues in mobile agent programming systems. IEEE Concurrency, 1998, 6(3) :52-61
  • 3Wilhelm U G, Saamann S M, Buttyan L. A pessimistic approach to trust in mobile agent platforms. IEEE Ccmputing, 2000,10(4) :40-48
  • 4Martin Schaaf, Frank Maure. Integrating Java and CORBA: A programmer' s perspective. IEEE Internet Computing, 2001,7 (1) :72-78
  • 5Wang X F, Yi X, Lam K Y. Secure information agent for inter net trading. In: Proc the 11th Australian Joint Conference on Artificial Intelligence'98, Brisban, Australia, 1998. 183-194
  • 6Farmer W M, Gutman J D, Swarup V. Security for mobile a gents: Authentication and state appraisal. In: Proc the 4th European Symposium on Research in Computer Security, Rome, Italy, 1996. 18-130
  • 7Bruce Eckel. Thinking in Java, 2nd Edition. New Jersey: Pren tice-Hall, 2000
  • 8Pfleeger C P. Security in Computing. 2nd Edition. Upper Sad dle River, New Jersey: Prentice Hall, 1997
  • 9Davies W, Price W L. Security for Computer Networks. Chich esfer: John Wiley & Sons, 1989

共引文献52

同被引文献6

  • 1[2]JORIS CLAESSENS.How can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions[J].ACM Transactions on Internet Technology,2003,3(1):28-48.
  • 2[3]BROOKS R R.Mobile code paradigms and security issues[J].IEEE Internet Computing,2004(5,6):54-59.
  • 3[4]ELMARIE BIERMAN.Classification of malicious host threats in mobile agent computing[C].Proceedings of Saicsit 2002,2002,9:141-148.
  • 4[5]OSCAR ESPARZA.A protocol for detecting malicious hosts based on limiting the execution time of mobile agents[C].Proceedings of ISCC 2003,2003,6:251-256.
  • 5[6]JOHN ZACHARY.Protecting mobile code in the wild[J].IEEE Internet Computing,2003(3,4):78-82.
  • 6胡涛,王汝传.移动代理安全攻击手段与防止技术分析[J].信息安全与通信保密,2003(8):40-43. 被引量:1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部