期刊文献+

MASTP协议及其在Aglets平台上的实现

Mobile Agent Secure Transfer Protocol and Its Implementation on Aglets Platform
在线阅读 下载PDF
导出
摘要 针对移动Agent安全性难以实现的问题,提出把安全电子商务的实现机制融入到对移动Agent的保护上,给出移动Agent的安全传输协议MASTP。通过修改Aglets中的系统函数和引入Cryptix包实现MASTP协议。结果证明,实现MASTP协议的Aglets平台具有系统级的传输安全性,且不会增加软件开发及运行的复杂性。 Security problem is critical but hard to solve for mobile Agent system, so this paper integrates the E-commerce security system into the protection of mobile Agent, and puts forward a new protocol named Mobile Agent Secure Transfer Protocol(MASTP). The protocol is applied and actualized on Aglets platform. It is proved that the Aglets platform based on MASTP is secure and it is not complicated to develop or execute the software.
作者 蒋丽 刘英华
出处 《计算机工程》 CAS CSCD 北大核心 2008年第24期167-169,共3页 Computer Engineering
关键词 移动代理 移动代理安全 Aglets平台 mobile Agent security of mobile Agent Aglets platform
  • 相关文献

参考文献3

二级参考文献23

  • 1[1]G Vigna. Protecting mobile agents through tracing. In: Proc of the 3rd Workshop on Mobile Object Systems. Finland, 1997. http://arthur.cs.ucdavis.edu/~barnes/seminar/papers/vigna97.ps
  • 2[2]F Hohl. A framework to protect mobile agents by using reference states. In: Proc of the 20th Int'l Conf on Distributed Computing Systems. Taipei, 2000. http://mole.informatik.uni-stuttgart.de/papers/icdcs2000hohl.pdf
  • 3[3]F Hohl. A protocol to detect malicious hosts attacks by using reference states. Universitat Stuttgart. Tech Rep: TR-1999-09, 1999. ftp://ftp.informatik.uni-stuttgart.de/pub/library/ncstrl.ustuttgart〖KG-*8 fi/TR-1999-09/TR-1999-09.ps.gz
  • 4[4]C Tschudin. Environmental security: Apoptotic functions, and a way to protect them. In: Proc of the 4th Workshop on Mobile Object System: Secure Internet Mobile Computations. Brussels, 1998. http://cuiwww.unige.ch/~ecoopws/ws98/slides/tschudin.ps
  • 5[5]B S Yee. A sanctuary for mobile agents. In: J Vitek, C Jensen eds. Secure Internet Programming: Security Issues for Mobile and Distributed Objects. New York: Springer-Verlag Inc, 1999. 261~274. http://www.cs.ucsd.edu/~bsy/pub/sanctuary.ps
  • 6[6]W Farmer, J Guttman et al. Security for mobile agents: Authentification and state appraisal. In: Fourth European Symp on Research in Computer Security (ESORICS 96). Rome, 1996. 118~130. http://imps.mcmaster.ca/doc/esorics96.ps
  • 7Gray, R.S., Cybenko, G., Kotz, D., et al. D'Agents: security in a multiple -language, mobile-agent system. In: Vigna, G., ed. Mobile Agents and Security. L ecture Notes in Computer Science 1419, Berlin: Springer-Verlag, 1998. 154~187.
  • 8Chess, D., Harrison, C., Kershenbaum, A. Mobile agents: are they a good id ea? 1994. http://www.research.ibm.com/iagents/paps/ mobile_idea.pdf.
  • 9Wahbe, R., Lucco, S., Anderson, T.E., et al. Efficient software-based faul t isolation. ACM SIGOPS Operating Systems Review, 1993,27(5):203~216.
  • 10Farmer, W., Guttman, J., Swarup, V. Security for mobile agents: authentica tion and state appraisal. In: Bertino, E., ed. Proceedings of the Computer Secur ity--ESORICS'96. Lecture Notes in Computer Science 1146, 1996. 118~130.

共引文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部