Tunghai University Institutional Repository:Item 310901/21847
English  |  正體中文  |  简体中文  |  全文笔数/总笔数 : 21921/27947 (78%)
造访人次 : 4242978      在线人数 : 775
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻


    jsp.display-item.identifier=請使用永久網址來引用或連結此文件: http://140.128.103.80:8080/handle/310901/21847


    题名: Efficient date-constraint access control and key management scheme for mobile agents
    作者: Chung, Y.-F.a , Kao, M.-H.a, Chen, T.-L.b, Chen, T.-S.
    贡献者: Department of Information Management, Tunghai University
    关键词: Access control;Date-constraint key management;Elliptic curve cryptosystem;Key management;Mobile agent
    日期: 2010-03-17
    上传时间: 2013-05-15T09:06:44Z (UTC)
    出版者: Kowloon; Hong Kong
    摘要: A mobile agent has become a competent software nowadays because of its significant abilities. It can roam freely in different Internet environments, adapt itself to various types of online servers totally associated to the characteristics of said server, and detect its environment and automatic adaptation to the environment while executing the assigned tasks by users. Due to these competencies, mobile agents have been widely used in Internet business, wireless communications, information security technologies and so forth. In 1983, Akl and Taylor suggested the concept of super-key to resolve the key management issues. It's the kind of thing where a mobile agent faces. Thus in 1998, Volker and Mehrdad proposed a tree-based mobile agent model to deal with the access control problem. The proposed scheme is based upon Elliptic Curve Cryptosystem (ECC), which enhances the operational ability of a mobile agent because of shorter key length and higher efficiency on encryption and decryption processes. For a mobile agent, a said user will be forced to log out of the system due to error or change in the user's rights or after a period of time. As is the case, the system must keep modifying the original access rights of the key so as to prevent a user from continuing to use his old key. However, this action could cause unnecessary error and risks, in addition to the large amount of computations that the system needs to perform. Hence, this paper proposes a Date-constraint key management scheme, where a date is attached to a key, so as to give its validity period of the key. Thus, key management can be more efficient.
    關聯: Proceedings of the International MultiConference of Engineers and Computer Scientists 2010, IMECS 2010
    2010, Pages 252-257
    显示于类别:[資訊管理學系所] 會議論文

    文件中的档案:

    档案 大小格式浏览次数
    index.html0KbHTML329检视/开启


    在THUIR中所有的数据项都受到原著作权保护.


    本網站之東海大學機構典藏數位內容,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈