期刊文献+

基于加密电路构造的移动代理保护安全模型的研究

The Research of Encrypted Circuit Construction Based Secure Model for Mobile Agent
在线阅读 下载PDF
导出
摘要 本文主要讨论保护移动代理免受恶意主机攻击的问题.在指出现有的基于“加密函数”的移动代理保护方法不足的同时作者提出了一种基于可信任元素的安全代理保护模型.这种可信任元素不同于可信任硬件如智能卡和协处理器,它是一种基于加密电路构造的第三方服务称为可信任服务.文中给出了移动代理计算的形式化描述,并说明了纯软件保护方法是不可行的,在介绍完加密电路构造方法后给出了基本模型来说明如何借助于可信任服务实现安全性,并对模型进一步扩充,最后给出应用该模型的一个实例分析. As a new technology, mobile agent shows a wide application in the field of network technology. However, security has been one of the crucial problems in the employment of mobile agents. In order to protect mobile agent against malicious hosts, some approaches have been proposed in the literature. A new protection model based on a trusted element is presented in this paper. The trusted element, which differs from traditional trusted hardware such as smart card or co-processor, offers a third party service based on an encrypted circuit construction. Procedure of constructing encrypted circuit is introduced and the way to use the trusted service to protect mobile agent is also described. An application example is given to show how to use the new model at the end of the paper.
出处 《电子学报》 EI CAS CSCD 北大核心 2006年第8期1410-1414,共5页 Acta Electronica Sinica
基金 国家自然科学基金(No.60573141 No 70271050) 江苏省自然科学基金(No.BK2005146) 江苏省高技术研究计划(No.BG2005037 No.BG2005038 No.BG2006001) 国家863高技术研究发展计划(No.2005AA775050) 南京市高技术项目(2006软资105) 江苏省计算机信息处理技术重点实验室基金(No.kjs050001 No.kjs06) 江苏省高校自然科学研究计划(No.05KJB520092)
关键词 移动代理 加密电路构造 安全性 mobile agent encrypted circuit construction security
  • 相关文献

参考文献7

  • 1王汝传,徐小龙,郑晓燕,孙知信.移动代理安全机制模型的研究[J].计算机学报,2002,25(12):1294-1301. 被引量:53
  • 2Greenberg M S,Byington L C,Harper D G.Mobile agents and security[J].Communications Magazine,IEEE,1998,36(7):76-85.
  • 3Micali S,Rogaway P.Secure computation[A].Advances in Cryptology:CRYPTO91[C].Lecture Notes in Computer Science,1992,576:392-404.
  • 4王汝传,孙开翠,张登银,杨立扬.基于JavaCard的移动代理保护的研究[J].计算机学报,2004,27(4):492-499. 被引量:8
  • 5Wilhelm U G,Staamann S,Buttyan L.Introducing trusted third parties to the mobile agent paradigm[A].Secure Internet Programming[C].Lecture Notes in Computer Science,col 1603,Springer,1999.469-589.
  • 6Yao A C.How to generate and exchange secrets[A].Proc.27^th IEEE Symposium on Fundations of Computer Science[C].1986.162-167.
  • 7Yee B.A sanctuary for mobile agents[A].Secure Internet Programming[C].Lecture Notes in Computer Science,Springer,1999,1603.261-273.

二级参考文献23

  • 1Chess D. Security Issues in mobile code systems. In: Vigna G ed. Mobile Agent Security, 1998. 1-14
  • 2Karnik N M, Tripathi A R. Design issues in mobile agent programming systems. IEEE Concurrency, 1998, 6(3) :52-61
  • 3Wilhelm U G, Saamann S M, Buttyan L. A pessimistic approach to trust in mobile agent platforms. IEEE Ccmputing, 2000,10(4) :40-48
  • 4Martin Schaaf, Frank Maure. Integrating Java and CORBA: A programmer' s perspective. IEEE Internet Computing, 2001,7 (1) :72-78
  • 5Wang X F, Yi X, Lam K Y. Secure information agent for inter net trading. In: Proc the 11th Australian Joint Conference on Artificial Intelligence'98, Brisban, Australia, 1998. 183-194
  • 6Farmer W M, Gutman J D, Swarup V. Security for mobile a gents: Authentication and state appraisal. In: Proc the 4th European Symposium on Research in Computer Security, Rome, Italy, 1996. 18-130
  • 7Bruce Eckel. Thinking in Java, 2nd Edition. New Jersey: Pren tice-Hall, 2000
  • 8Pfleeger C P. Security in Computing. 2nd Edition. Upper Sad dle River, New Jersey: Prentice Hall, 1997
  • 9Davies W, Price W L. Security for Computer Networks. Chich esfer: John Wiley & Sons, 1989
  • 10Wilhelm U.G., Staamann S.M., Buttyan L.. A pessimistic approach to trust in mobile agent platforms. IEEE Computing, 2000, 40~48

共引文献58

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部