|
English
|
正體中文
|
简体中文
|
Items with full text/Total items : 21921/27947 (78%)
Visitors : 4231295
Online Users : 533
|
|
|
Loading...
|
Please use this identifier to cite or link to this item:
http://140.128.103.80:8080/handle/310901/21863
|
Title: | Hierarchical time-bound key management for mobile agents |
Authors: | Chung, Y.-F.a , Chen, T.-S.b, Ho, C.-C.c, Yeh, Y.-H.b, Ko, H.-C. |
Contributors: | Department of Information Management, Tunghai University |
Keywords: | Access Control;Elliptic Curve Cryptosystem;Key Management;Mobile Agent;Time-bound Key Management |
Date: | 2009-06-08 |
Issue Date: | 2013-05-15T09:06:56Z (UTC)
|
Publisher: | Taipei; Taiwan |
Abstract: | The core competencies that a mobile agent possesses are free-roaming between different environment, and autonomous environment detection and adaptation while executing the tasks that are assigned by the users. Because of these competencies, the concept of mobile agent is widely used in many different fields, such as Internet business, wireless communication, and information security technologies and etc. In 1983, Akl and Taylor [1] suggested the concept of superkey to resolve the key management issues faced by the mobile agent. Later in 1998, Volker and Mehrdad [2] proposed a hierarchical mobile agent model for access control. The proposed paper would be based upon the studies of superkey and a hierarchical mobile agent model with addition of elliptic curve cryptosystem (ECC). ECC enhances the mobile agent model, because of shorter key length and higher efficiency on encryption and decryption. All the related works would be presented in Section 2. After the background of our proposal is well described, we would aim to resolve the key management issue created by Volker and Mehrdad's model. Time-bound key management is considered to be a good solution, because it can make the key management in the existing mobile agent model more convenient by distributing the keys that can only be used in a limited period of time. ? 2009 Springer Berlin Heidelberg. |
Relation: | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Volume 5574 LNCS, 2009, Pages 242-253 |
Appears in Collections: | [資訊管理學系所] 會議論文
|
Files in This Item:
File |
Size | Format | |
index.html | 0Kb | HTML | 227 | View/Open |
|
All items in THUIR are protected by copyright, with all rights reserved.
|