English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 21921/27947 (78%)
造訪人次 : 4242190      線上人數 : 612
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋


    請使用永久網址來引用或連結此文件: http://140.128.103.80:8080/handle/310901/21638


    題名: Efficient hierarchical key management scheme for access control in the mobile agent
    作者: Chung, Y.-F.a, Chen, T.-S.b , Liu, C.-H.c, Wang, T.-C.b
    貢獻者: Department of Electrical Engineering, Tunghai University
    關鍵詞: Access control;Information security;Key management;Mobile agent;Polynomial interpolation formula
    日期: 2008-03-25
    上傳時間: 2013-05-15T09:03:31Z (UTC)
    出版者: Okinawa; Japan
    摘要: Technologies and their applications related to e-commerce have always been the topic of interests to attract researchers and widely discussed. Among them, the use of the mobile agent in e-commerce is a highly potential technology which has accumulated a lot of interests in recent years. Since the mobile agent has high autonomy and mobility, it can move, unbridled, in different execution environments. At the same time, it can automatically detect its current environment and respond accordingly. Finally, it can also carry out work, or tasks assigned to it by its user. The above qualities make the mobile agent very suitable for use in e-commerce. The internet is an open environment. When there is a need to transfer, or exchange confidential information over the internet, the security of the present Internet environment must be improved. Even so, during its execution, a mobile agent needs to roam around the internet between different servers on the internet. At the same time, a mobile agent may also come in contact, or interact with other mobile agents or hosts. Therefore, the users may worry that a mobile agent may not work properly if it meets with a malicious program, or if it is tampered with by a malicious host, or that confidential information carried by the mobile agent may be stolen by other agents. To ensure the safety of mobile agents on the internet, this paper proposes a security scheme suitable for use to mobile agents: The scheme includes access control and key management to ensure the security and confidentiality of information and the system. In view of the access control and key management scheme for mobile agents proposed by Volker and Mehrdad[l], this paper proposes a new scheme that uses the concepts of polynomial interpolation formula[19], the hierarchy structure and the superkey[8] to improve the previous security schemes which need a large amount of space for the mobile agent. According to this paper's security and performance analysis, it is proved that the proposed scheme can efficiently protect the mobile agents. ? 2008 IEEE.
    關聯: Proceedings - International Conference on Advanced Information Networking and Applications, AINA
    2008, Article number4482989, Pages 650-655
    顯示於類別:[電機工程學系所] 會議論文

    文件中的檔案:

    檔案 大小格式瀏覽次數
    index.html0KbHTML292檢視/開啟


    在THUIR中所有的資料項目都受到原著作權保護.


    本網站之東海大學機構典藏數位內容,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回饋