Authentication, access control and protection of mobile agents
碩士 === 國立中興大學 === 資訊科學學系 === 86 === Mobile agents, a new computing paradigm, has been proposed to address the issues of lower bandwidth, lower transmission speed, and higher cost of mobile computing. One of the essential aspects of a viable mobile agent b...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
1998
|
Online Access: | http://ndltd.ncl.edu.tw/handle/44386324711917431727 |
id |
ndltd-TW-086NCHU1394013 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-086NCHU13940132015-10-13T11:03:32Z http://ndltd.ncl.edu.tw/handle/44386324711917431727 Authentication, access control and protection of mobile agents 行動代理人程式的認證及中間結果的存取控制與保護 Chu, Chin-Ju 邱擎智 碩士 國立中興大學 資訊科學學系 86 Mobile agents, a new computing paradigm, has been proposed to address the issues of lower bandwidth, lower transmission speed, and higher cost of mobile computing. One of the essential aspects of a viable mobile agent based system is the security mechanisms available to protect it from the security threats in an open system environment. Some new Internet protocols (such as IPv6, SSL, etc.) provide security mechanisms for the underling communication system to developers. However, for the responsibility of security, mobile agent system should have its own security mechanisms in agent level or agent communication level such as authentication of agents, protection of message issued by agent and no denial of agent delegated by agent server, etc. Currently, the research related to mobile agent''s security provides few practical approaches to protect the intermediate results of agents. Moreover, most research works are based on the assumption of trusted executing environments. In this thesis, we propose security mechanisms to protect intermediate results of mobile agent in a dynamically changing hierarchical group architecture and trusted executing environments with the approaches of key assignment in dynamically constructing group architectures and gOur security mechanisms will provide good solutions for mobile agents and the agent servers hosting them to solve the vital issues of security in order for the mobile agents to be commercially viable. Chen Wen-Shyen 陳文賢 1998 學位論文 ; thesis 1 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立中興大學 === 資訊科學學系 === 86 === Mobile agents, a new computing paradigm, has been proposed to
address the issues of lower bandwidth, lower transmission speed,
and higher cost of mobile computing. One of the essential
aspects of a viable mobile agent based system is the security
mechanisms available to protect it from the security threats in
an open system environment. Some new Internet protocols (such as
IPv6, SSL, etc.) provide security mechanisms for the underling
communication system to developers. However, for the
responsibility of security, mobile agent system should have its
own security mechanisms in agent level or agent communication
level such as authentication of agents, protection of message
issued by agent and no denial of agent delegated by agent
server, etc. Currently, the research related to mobile agent''s
security provides few practical approaches to protect the
intermediate results of agents. Moreover, most research works
are based on the assumption of trusted executing environments.
In this thesis, we propose security mechanisms to protect
intermediate results of mobile agent in a dynamically changing
hierarchical group architecture and trusted executing
environments with the approaches of key assignment in
dynamically constructing group architectures and gOur security
mechanisms will provide good solutions for mobile agents and the
agent servers hosting them to solve the vital issues of security
in order for the mobile agents to be commercially viable.
|
author2 |
Chen Wen-Shyen |
author_facet |
Chen Wen-Shyen Chu, Chin-Ju 邱擎智 |
author |
Chu, Chin-Ju 邱擎智 |
spellingShingle |
Chu, Chin-Ju 邱擎智 Authentication, access control and protection of mobile agents |
author_sort |
Chu, Chin-Ju |
title |
Authentication, access control and protection of mobile agents |
title_short |
Authentication, access control and protection of mobile agents |
title_full |
Authentication, access control and protection of mobile agents |
title_fullStr |
Authentication, access control and protection of mobile agents |
title_full_unstemmed |
Authentication, access control and protection of mobile agents |
title_sort |
authentication, access control and protection of mobile agents |
publishDate |
1998 |
url |
http://ndltd.ncl.edu.tw/handle/44386324711917431727 |
work_keys_str_mv |
AT chuchinju authenticationaccesscontrolandprotectionofmobileagents AT qiūqíngzhì authenticationaccesscontrolandprotectionofmobileagents AT chuchinju xíngdòngdàilǐrénchéngshìderènzhèngjízhōngjiānjiéguǒdecúnqǔkòngzhìyǔbǎohù AT qiūqíngzhì xíngdòngdàilǐrénchéngshìderènzhèngjízhōngjiānjiéguǒdecúnqǔkòngzhìyǔbǎohù |
_version_ |
1716836168206647296 |