Authentication, access control and protection of mobile agents

碩士 === 國立中興大學 === 資訊科學學系 === 86 === Mobile agents, a new computing paradigm, has been proposed to address the issues of lower bandwidth, lower transmission speed, and higher cost of mobile computing. One of the essential aspects of a viable mobile agent b...

Full description

Bibliographic Details
Main Authors: Chu, Chin-Ju, 邱擎智
Other Authors: Chen Wen-Shyen
Format: Others
Language:zh-TW
Published: 1998
Online Access:http://ndltd.ncl.edu.tw/handle/44386324711917431727
Description
Summary:碩士 === 國立中興大學 === 資訊科學學系 === 86 === Mobile agents, a new computing paradigm, has been proposed to address the issues of lower bandwidth, lower transmission speed, and higher cost of mobile computing. One of the essential aspects of a viable mobile agent based system is the security mechanisms available to protect it from the security threats in an open system environment. Some new Internet protocols (such as IPv6, SSL, etc.) provide security mechanisms for the underling communication system to developers. However, for the responsibility of security, mobile agent system should have its own security mechanisms in agent level or agent communication level such as authentication of agents, protection of message issued by agent and no denial of agent delegated by agent server, etc. Currently, the research related to mobile agent''s security provides few practical approaches to protect the intermediate results of agents. Moreover, most research works are based on the assumption of trusted executing environments. In this thesis, we propose security mechanisms to protect intermediate results of mobile agent in a dynamically changing hierarchical group architecture and trusted executing environments with the approaches of key assignment in dynamically constructing group architectures and gOur security mechanisms will provide good solutions for mobile agents and the agent servers hosting them to solve the vital issues of security in order for the mobile agents to be commercially viable.