期刊文献+

新颖的移动代理动态数据完整性保护协议 被引量:1

Novel mobile agent dynamic data integrity protection protocol
在线阅读 下载PDF
导出
摘要 通过引入攻击者能力来对完整性的强弱进行划分和定义,在此基础上,分析了合谋情况下对动态数据进行截断攻击的问题,并给出了一个新颖的移动代理数据保护协议,该协议通过引入反向签名机制,形成一条从源节点到当前节点的信任链,实现对漫游路径的完整性保护,很好地解决了合谋情况下对动态数据的截断攻击,为自由漫游移动代理提供了更强的完整性保护。还使用形式化方法对协议的安全属性进行了分析验证。 Integrity characteristics of dynamic data was redefined and classified by attacker capability, and then it was analyzed how to protect truncation attack with collusion. After that, a data protection protocol of free-roaming agent was presented. The protocol used a reverse chained signature to protect the integrity of roaming path, and protected the dynamic data integrity based on this. Specially, the protocol provided truncation resilience in collusion condition, and its secure property was proved by formal method.
出处 《通信学报》 EI CSCD 北大核心 2007年第8期1-10,共10页 Journal on Communications
基金 国家安全重大基础研究项目(5130103) 国家自然科学基金资助项目(60573042) 国家重点基础研究发展计划("973"计划)基金资助项目(G1999035802) 北京市自然科学基金资助项目(4052016)~~
关键词 移动代理 自由漫游 抗截断攻击 数据完整性 mobile agents free-roaming truncation resilience data integrity
作者简介 李鹏飞(1974-),男,河北定州人,中国科学院博士生,主要研究方向为信息安全。卿斯汉(1939-),男,湖南隆回人,中国科学院研究员、博士生导师,主要研究方向为信息安全理论与技术。马恒太(1970-),男,山东临朐人,中国科学院副研究员,主要研究方向为信息安全。邓勇(1974-),男,湖南双峰人,中国科学院副研究员,主要研究方向为计算机应用技术。
  • 相关文献

参考文献21

  • 1BROOKS R R.Mobile code paradigms and security issues[J].IEEE Computer Society,2004,8(3):54-59.
  • 2LUCCO S,SHARP O,WAHBE R.Omniware:universial substrate for Web programming[A].Proceedings of the Fourth International World Wide Web Conference[C].Boston,Mssachusetts,USA,1995.
  • 3OUSTERHOUT J,LEVY J,WELCH B.The Safe-TCL Security Model Technical Reports[R].Sun Microsystems,1996.
  • 4TARDO J,VALENTA L.Mobile agent security and telescript[A].Proceedings IEEE COMPCON'96[C].1996.
  • 5YELLIN F.Low Level Security in Java[R].Sun Microsystems,1995.
  • 6MAGGI P,SISTO R.A configurable mobile agent data protection protocol[A].AAMAS'03[C].Melbourne,Australia,2003.851-858.
  • 7VIGNA G.Protecting mobile agents through tracing[A].Proceedings of the Third ECOOP Workshop on Mobile Objects Systems[C].Finnland,1997.
  • 8KARJOTH G.Secure mobile agent-based merchant brokering in distributed marketplaces[A].Proc ASA/MA 2000(D.Kotz and F.Mattern,eds.)[C].Berlin Heidelberg:Springer Verlag,2000.44-56.
  • 9KARJOTH G,ASOKAN N,GULCU C.Protecting the computation results of free-roaming agents[A].Second International Workshop on Mobile Agents[C].1998.224-234.
  • 10YEE B S.A sanctuary for mobile agents[A].Secure Internet Programming Security Issues for Mobile and Distributed Objects[C].Springer-Verlag,Berlin Germany,1999.261-273.

同被引文献10

  • 1X Hannotin, P Maggi, Riccardo Sisto. Formal specification and verification of mobile agent data integrity properties: a case study[ A]. Mobile Agents: 5th Intemational Conference[ C]. Atlanta, GA, USA, 2001.41.
  • 2P Ryan,等著,张玉清,等译.安全协议的建模与分析[M].北京,机械工业出版社,2005.
  • 3P Maggi, R Sisto. Experiments on formal verification of mobile agent data integrity properties [ A ]. Workshop on Objects and Agents 2002(WOA2002) [C]. Milano, Italy, 2002.131 - 136.
  • 4Raja Al-Jaljouli. A Proposed Security Prototcol for Data Gathering Mobile Agents [ R]. The University of New South Wales, Report, Sydney, Australia, 21304.
  • 5Raja Al-Jaljouli. Formal Methods in the Enhancement of the Data Security Protocols of Mobile Agents[ R]. The University of New South Wales,Report, Sydney,Australia,2005.
  • 6P Maggi, R Sisto. A configurable mobile agent data protection protocol[A]. AAMAS'03 [ C]. Melbourne, Australia, 2003. 851 - 858,.
  • 7S A Schneider. Verifying authentication protocols with CSP[ J]. IFEF. Transaclions on Software Engineering. 1998,24(9):741 - 758.
  • 8S A Schneider. Formal analysis of a non-repudiation protocol[A]. 11th Computer Security Foundations Workshop[C]. Rockport Massachusetts: IEEE Computer Society Press, 1998. 54 - 65.
  • 9G Karjoth,N Asokan,C Gulcu. Protecting the computation resuits of free-roaming agents[J] .Personal and Ubiquitous Compuling, 1998,2(2) :92 - 99.
  • 10G Lower. A hierarchy of authentication specification[ A]. Proceedings of the 10th IEEE Woad, hop on Computer Security Foundations[C]. IEEE Computer Socicty, Washington, DC, USA, 1997.31 - 43.

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部