期刊文献+

PDHA:一种移动Agent保护协议研究

PDHA:A Protocol for Mobile Agent Protection
在线阅读 下载PDF
导出
摘要 针对移动Agent本身的安全性问题,提出了一种基于软件防护的移动Agent保护协议??PDHA(aproto-coltodetectmalicioushosts’attacks),并对该协议进行了安全性分析和性能分析。该协议的核心思想是通过关联密钥链加密机制对移动Agent的数据进行加密,并应用参考状态分析机制对移动Agent的代码、状态进行保护,从而形成一种全面的移动Agent保护协议。实验表明,PDHA协议功能是可以达到的,安全性也更强。 Focusing on the security problems of mobile Agents, a new software protection based protocol-PDHA(a protocol to detect malicious hosts' attacks)is proposed. Security analyses and performance analyses for this protocol are surveyed. The key idea of PDHA protocol is to encrypt data of mobile Agents with the mechanism of interrelated keys chains encryption, to protect codes and states of mobiles Agents with the mechanism of reference states analyses, and to present a full protocol for mobile Agent protection. The simulation experiments show the functionality of PDHA protocol can be implemented,and its security is higher.
出处 《计算机科学》 CSCD 北大核心 2006年第10期74-79,共6页 Computer Science
基金 国家863资助项目(编号:2004AA1Z2450) 智能技术与系统国家重点实验室开放课题资助项目(编号:99008) 河北省科技攻关计划资助项目(编号:WM05G13)。
关键词 移动AGENT 安全性 机密性 完整性 Aglets系统 Mobile agent, Security, Confidentiality, Integrity, Aglets system
  • 相关文献

参考文献13

  • 1Torsten I,Frank K.Migration of Mobile Agents in Java:Problems,Classfication and Solutions[C].In:MAMA' 2000.Canada:International Computer Science Conventions Academic Press,Australia,December 2000.362~369
  • 2Michael S,et al.Mobile Agents and Security[J].IEEE Communications Magazine,1998,36(7):76~85
  • 3Jansen W.Countermeasures for Mobile Agent Security[J].Computer Communications,2000,23(17):1667~1676
  • 4Moore J T.Mobile Code Security Techniques[R]:[Technical Report].MS-CIS-98-28,University of Pennsylvania,1998.1~ 10
  • 5Corradi A,Montanar R.Mobile Agent Protection in the Internet Environment.In:Gibson RM,ed.Proceedings of the 23th Annual Int'l Computer Software and Applications Conf.Los Alamitos:IEEE Computer Society Press.1999.80~85
  • 6Systemics Ltd.Cryptix Library.《URL:http://www.cryptix.org/》
  • 7谭湘,顾毓清,包崇明.一种用于移动Agent数据保护的机制[J].软件学报,2005,16(3):477-484. 被引量:8
  • 8Wilhelm G,Staamann M.A Pessimistic Approach to Trust in Mobile Agent Platforms.IEEE Intemet Computing,2000,4 (5):40~48
  • 9Corradi A,Cremonini M.Mobile Agents Integrity for Electronic Commerce Applications.Information Systems,1999,24 (6):519~533
  • 10Cheng J S L,Victor KW.Defenses against the Truncation of Computation Results of Free-roaming Agents.In:Deng RH,Qing SH,Bao F,et al.eds.Information and Communications Security.London:Springer-Verlag,2002.1~12

二级参考文献8

  • 1Jansen W. Countermeasures for mobile Agent security. Computer Communications, 2000,23(10):1667-1677.
  • 2Corradi A, Montanar R. Mobile Agent protection in the Internet environment. In: Gibson RM, ed. Proc. of the 23th Annual Int'l Computer Software and Applications Conf. Los Alamitos: IEEE Computer Society Press, 1999. 80-85.
  • 3Corradi A, Cremonini M. Mobile Agents integrity for electronic commerce applications. Information Systems, 1999,24(6): 519-533.
  • 4Karjoth G, Asokan N, Glc C. Protecting the computation results of free-roaming Agents. In: Rothermel K, Hohl F, eds. Mobile Agents: 2nd Int'l Workshop. London: Springer-Verlag, 1998. 195-207.
  • 5Cheng JSL, Victor KW. Defenses against the truncation of computation results of free-roaming Agents. In: Deng RH, Qing SH, Bao F, Zhou JY, eds. Information and Communications Security. London: Springer-Verlag, 2002. 1-12.
  • 6Wilhelm G, Staamann M. A pessimistic approach to trust in mobile Agent platforms. IEEE Internet Computing, 2000,4(5):40-48.
  • 7Stalling W. Network Security Essentials: Applications and Standards. New York: Prentice Hall, 1999. 119-123.
  • 8Karjoth G, Lange DB, Oshima M. A security model for aglets. IEEE Internet Computing, 1997,1(4):68-77.

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部