期刊文献+

基于只读算法和只加算法的移动agent的保护机制 被引量:1

Protection of mobile agent based on read-only and append-only algorithm
在线阅读 下载PDF
导出
摘要 通过引入只读算法和只加算法机制来保护移动agent的安全,并对算法的安全性进行了模拟实验;将密码学中的公钥密码体系引入移动agent保护机制,而该机制能有效地保护agent的数据或状态。理论和实验都表明,通过这两种算法,移动agent的安全性有了较大的提高。 The mechanisms of read-only algorithm and append-only algorithm are proposed to protect the security of mobile agent, and the security of the algorithms is analyzed in several simulations. In the mechanism, public key cryptography is introduced in mobile agent system, thus it can protect data or states of the agent more efficiently. The result from theory and simulated experiments show that the security of mobile agent systems with the two algorithms has been improved.
出处 《上海海事大学学报》 北大核心 2004年第4期54-57,共4页 Journal of Shanghai Maritime University
基金 上海高校自然科学发展基金项目(03IK11)
关键词 AGENT 移动AGENT 安全 保护agent 只读算法 只加算法 agent mobile agent security protection of agent read-only algorithm append-only algorithm
作者简介 陶冬霞(1980-),女,安徽铜陵人,在读硕士,主要研究方向为网格计算和移动agent系统,(E-mail)taodongxia@sohu.com
  • 相关文献

参考文献9

  • 1[1]Wayne A Jansen. Countermeasures for mobile agent security [EB/OL]. 《URL:http://csrc.nist.gov/mobilesecurity/Publications/ppcounterMeas.pdf》.
  • 2[2]Loureiro S. Mobile code protection[D].Doctoral Dissertation, ENST Paris/Institut Eurecom, Sophia Antipolis, France, 2001.
  • 3[3]Gray R. Agent Tcl: A flexible and secure mobile agent system [D]. Hanover: Dartmouth College, 1997.
  • 4[4]William M Farmer, Joshua D Guttman, Vipin Swarup. Security for mobile agents: authentication and state appraisal[A].In: ESORICS '96: 4th European Symposium on Research in Computer Security[C]. 1996(9):118-130.
  • 5[5]Karnik N, Tripathi A. A security architecture for mobile agents in Ajanta[A].In: Proc. of the International Conference on Distributed Computing Systems (ICDCS 00)[C]. 2000:402-409.
  • 6[6]Algesheimer J, et al. Cryptographic security for mobile code[A]In:Proc. 2001 IEEE Symp [C]. Security and Privacy, IEEE Press, 2001.
  • 7[7]LU S, XU Chengzhong. Mail: A mobile agent itinerary language for correctness and secure assurance[R]. Technical Report CIC-03-04, Cluster and Internet Computing Lab, Wayne State University. 2003.
  • 8[8]XU Chengzhong. NapLet: A flexible and secure mobile agent framework for network-centric pervasive applications[A]. In: Proc. of the 2nd Workshop on Internet Computing and e-Commerce (ICEC 02)[C]. 2002.
  • 9[9]ZHONG X, SHEN H, XU Chengzhong . A reliable and secure connection migration mechanism for mobile agents[A].In:Proc. of Int l Workshop on Mobile Distributed Computing (MDC 2004)[C]. 2004.

同被引文献6

  • 1蒋德荣,史小宏.基于背包数字签名的Agent安全通信研究[J].湖北广播电视大学学报,2007,27(7):137-138. 被引量:1
  • 2D. Lange, M. Oshima. Programming and deploying Java mobile agents with Aglets [ J ]. Addison Welsey, 1998, (11):114-117.
  • 3G. Karjoth, N. Asokan, C. Gulcu. Protecting the computation results of free - roaming agents [ J]. In K . Rothermel and F. Hohl, editors, Proceedings of the 2nd International Workshop on Mobile Agents, volume 1477 of Lecture Notes in Computer Science, 1998, (12) : 195 - 207.
  • 4P. F. Syverson, D. M. Goldschlag, M. G. Reed. Anonymous connections and onion routing[ J]. In IEEE Symposium on Security and Privacy, 1997, (8) :44 - 54.
  • 5陶冬霞 史小宏.基于移动Agent的电子商务安全机制研究.计算机应用研究,2004,(3):96-99.
  • 6蒋德荣,陶冬霞,史小宏.基于三重加密的移动Agent保护机制[J].电脑知识与技术,2007(9):1252-1253. 被引量:1

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部