期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Protecting mobile agents' data using trusted computing technology 被引量:1
1
作者 XIAN He-qun FENG Deng-guo 《通讯和计算机(中英文版)》 2007年第3期44-51,共8页
关键词 信任计算技术 移动代理 私钥 通信安全
下载PDF
Instance-oriented delegation: A solution for providing security to Grid-based mobile agent middleware
2
作者 马天驰 李善平 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第5期405-413,共9页
New challenges are introduced when people try to build a general-purpose mobile agent middleware in Grid envi- ronment. In this paper, an instance-oriented security mechanism is proposed to deal with possible security... New challenges are introduced when people try to build a general-purpose mobile agent middleware in Grid envi- ronment. In this paper, an instance-oriented security mechanism is proposed to deal with possible security threats in such mobile agent systems. The current security support in Grid Security Infrastructure (GSI) requires the users to delegate their privileges to certain hosts. This host-oriented solution is insecure and inflexible towards mobile agent applications because it cannot prevent delegation abuse and control well the diffusion of damage. Our proposed solution introduces security instance, which is an en- capsulation of one set of authorizations and their validity specifications with respect to the agent’s specific code segments, or even the states and requests. Applications can establish and configure their security framework flexibly on the same platform, through defining instances and operations according to their own logic. Mechanisms are provided to allow users delegating their identity to these instances instead of certain hosts. By adopting this instance-oriented security mechanism, a Grid-based general-purpose MA middleware, Everest, is developed to enhance Globus Toolkit’s security support for mobile agent applications. 展开更多
关键词 Mobile agent GRID Trust model DELEGATION
下载PDF
Provably Secure and Efficient Proxy Signature with Untrustworthy Proxy Signer
3
作者 王志伟 郑世慧 +2 位作者 王励成 杨义先 胡正名 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第6期675-678,共4页
Proxy signature has drawn great concerns. However, there still remains a challenge to construct a provably secure and efficient proxy signature scheme. In this paper, we propose an efficient proxy signature scheme bas... Proxy signature has drawn great concerns. However, there still remains a challenge to construct a provably secure and efficient proxy signature scheme. In this paper, we propose an efficient proxy signature scheme based on factoring, and prove that it is secure in the random oracle. Furthermore, we present a new type of proxy signature, called Proxy Signature with Untrustworthy Proxy Signer, and construct a concrete scheme. 展开更多
关键词 proxy signature FACTORING untrustworthy proxy signer
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部