期刊文献+

基于移动Agent的协同电子商务安全认证机制 被引量:2

Mobile Agent-basd Cooperative E-commerce Security Authentication Mechanism
在线阅读 下载PDF
导出
摘要 如何提供一个协同、开放、灵活并高效的安全服务,是协同电子商务必须解决的一个重要问题,移动Agent为解决这一问题提供了一个新的方法。该文介绍一种基于历史事件的安全认证机制,以期进一步完善协同电子商务中的安全服务问题。 It is an important problem that providing a concurrent opening flexible and high effective security service for the cooperative e-commerce. A novel method is provided by mobile agent to resolve this problem. A history events-based security authentication method is given by the paper for resolving some security service problems in the cooperative e-commerce.
作者 周克江
出处 《计算机工程》 CAS CSCD 北大核心 2007年第9期163-164,167,共3页 Computer Engineering
关键词 移动AGENT 协同电子商务 数字证书 PSL 安全策略 Mobile agent Cooperative e-commerce Figure certification Security policy language(PSL) Security strategy
  • 相关文献

参考文献8

  • 1杨青,怀进鹏,徐枞巍.基于SAML的协同电子商务安全服务系统[J].计算机工程与应用,2002,38(14):228-232. 被引量:20
  • 2Agrawal R,Gehrke J,Gonopolos D,et al.Automatic Subspace Clustering of High Dimensional Data for Data Mining Applications[C]//Proc.of ACM-SIGMOD Int.Conf.on Management of Data.1998.
  • 3Agrawal R,Srikant R.Privacy-preserving Data Mining[C]//Proc.of ACM-SIGMOD Int.Conf.on Management of Data.2000.
  • 4Mannila H,Toivonen H,Verkamo A I.Discovering Frequent Episodes in Sequences[C]//Proc.of the 1st Int.Conf.on Knowledge Discovery Databases and Data Mining.1995.
  • 5Agrawal R.Fast Discovery of Association Rules[C]//Proc.of Advances in Knowledge Discovery and Data Mining.1996.
  • 6丁建国,柳惠琳,陈涵生,白英彩.移动Agent的一种安全认证机制[J].计算机工程,2001,27(2):74-75. 被引量:20
  • 7Ribeiro C N,Zúquete A,Ferreira P.SPL:An Access Control Language for Security Policies with Complex Constraints[C]//Proc.of Network and Distributed System Security Symposium.2001.
  • 8Brewer D F C,Nash M J.The Chinese Wall Security Policy[C]//Proc.of IEEE Symposium on Research in Security and Privacy.1989.

二级参考文献7

  • 1(美)Merike Kaeo 潇湘工作室(译).网络安全设计(第一版)[M].北京:人民邮电出版社,2000..
  • 2(美)Li Gong 王运凯等(译).Java2平台安全技术--结构、API和实现(第一版)[M].北京:机械工业出版社,2000..
  • 3[1]Harrison C G, Chess D M. Mobile Agent: Are They Good Idea?IBM Research Report,1995
  • 4[2]David K, Robert S G. Mobile Agents and the Future of the Internet. ACM Operating System Review, 1999-08:7-13
  • 5[3]Sander T, Christian F T. Mobile Agent and Security. Spriner Verlag Lecture Notes in Computer Science #1419, 1998-06
  • 6[4]Tripathi A R, Karnik N M. Protected Resource Access for Mobile Agent-based Distributed Computing. Proceedings of the 1998 ICPP Workshop on Wireless Networks and Mobile Computing.IEEE Computer Society, 1998-08: 144-153
  • 7[5]Greenberg M S, Byington L C, Harper D G. Mobile Agents and Security. IEEE Communications Magazine, 1998, 36(7): 76-85

共引文献37

同被引文献8

  • 1张利华,吕善伟.广义椭圆曲线数字签名动态用户认证机制[J].系统工程与电子技术,2006,28(10):1569-1571. 被引量:1
  • 2PASHALIDIS A,FLEURY M.Secure network management within an open-source mobile agent framework[J].Journal of Network and Systems Management,2004,12(1):9-31.
  • 3YU W,MOK A K.Enforcing resource bound safety for mobile SNMP agents[C]// 18th Annual Computer Security Applications Conference.Piscataway:IEEE,2002:69-77.
  • 4KARNIK N M,TRIPATHI A R.Security in the ajanta mobile agent system[J].Softwore-Practice and Experience,2001,31(4):301-329.
  • 5PAGUREK B,WANG Y,WHITE T.Integration of mobile agents with SNMP:Why and how[C]// IEEE/IFIP Network Operations and Management Symposium.Piscataway:IEEE,2000:609-622.
  • 6PASHALIDIS A,FLEURY M.Secure network management within an open-source mobile agent framework[J].Journal of Network and Systems Management,2004,12(1):9-31.
  • 7ROCHA A,ROCHA C A,SOUZA J N.Script MIB extension for resource limitation in SNMP distributed management environments[C]// 11th International Conference on Telecommunications.Berlin:Springler-Verlag,2004:835-840.
  • 8SCHONWALDER J,PRAS A,MATIN F J P.On the future of internet management technologies[J].Communications Magazine,2003,41(10):90-97.

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部