Authentication, access control and protection of mobile agents

碩士 === 國立中興大學 === 資訊科學學系 === 86 === Mobile agents, a new computing paradigm, has been proposed to address the issues of lower bandwidth, lower transmission speed, and higher cost of mobile computing. One of the essential aspects of a viable mobile agent b...

Full description

Bibliographic Details
Main Authors: Chu, Chin-Ju, 邱擎智
Other Authors: Chen Wen-Shyen
Format: Others
Language:zh-TW
Published: 1998
Online Access:http://ndltd.ncl.edu.tw/handle/44386324711917431727
id ndltd-TW-086NCHU1394013
record_format oai_dc
spelling ndltd-TW-086NCHU13940132015-10-13T11:03:32Z http://ndltd.ncl.edu.tw/handle/44386324711917431727 Authentication, access control and protection of mobile agents 行動代理人程式的認證及中間結果的存取控制與保護 Chu, Chin-Ju 邱擎智 碩士 國立中興大學 資訊科學學系 86 Mobile agents, a new computing paradigm, has been proposed to address the issues of lower bandwidth, lower transmission speed, and higher cost of mobile computing. One of the essential aspects of a viable mobile agent based system is the security mechanisms available to protect it from the security threats in an open system environment. Some new Internet protocols (such as IPv6, SSL, etc.) provide security mechanisms for the underling communication system to developers. However, for the responsibility of security, mobile agent system should have its own security mechanisms in agent level or agent communication level such as authentication of agents, protection of message issued by agent and no denial of agent delegated by agent server, etc. Currently, the research related to mobile agent''s security provides few practical approaches to protect the intermediate results of agents. Moreover, most research works are based on the assumption of trusted executing environments. In this thesis, we propose security mechanisms to protect intermediate results of mobile agent in a dynamically changing hierarchical group architecture and trusted executing environments with the approaches of key assignment in dynamically constructing group architectures and gOur security mechanisms will provide good solutions for mobile agents and the agent servers hosting them to solve the vital issues of security in order for the mobile agents to be commercially viable. Chen Wen-Shyen 陳文賢 1998 學位論文 ; thesis 1 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立中興大學 === 資訊科學學系 === 86 === Mobile agents, a new computing paradigm, has been proposed to address the issues of lower bandwidth, lower transmission speed, and higher cost of mobile computing. One of the essential aspects of a viable mobile agent based system is the security mechanisms available to protect it from the security threats in an open system environment. Some new Internet protocols (such as IPv6, SSL, etc.) provide security mechanisms for the underling communication system to developers. However, for the responsibility of security, mobile agent system should have its own security mechanisms in agent level or agent communication level such as authentication of agents, protection of message issued by agent and no denial of agent delegated by agent server, etc. Currently, the research related to mobile agent''s security provides few practical approaches to protect the intermediate results of agents. Moreover, most research works are based on the assumption of trusted executing environments. In this thesis, we propose security mechanisms to protect intermediate results of mobile agent in a dynamically changing hierarchical group architecture and trusted executing environments with the approaches of key assignment in dynamically constructing group architectures and gOur security mechanisms will provide good solutions for mobile agents and the agent servers hosting them to solve the vital issues of security in order for the mobile agents to be commercially viable.
author2 Chen Wen-Shyen
author_facet Chen Wen-Shyen
Chu, Chin-Ju
邱擎智
author Chu, Chin-Ju
邱擎智
spellingShingle Chu, Chin-Ju
邱擎智
Authentication, access control and protection of mobile agents
author_sort Chu, Chin-Ju
title Authentication, access control and protection of mobile agents
title_short Authentication, access control and protection of mobile agents
title_full Authentication, access control and protection of mobile agents
title_fullStr Authentication, access control and protection of mobile agents
title_full_unstemmed Authentication, access control and protection of mobile agents
title_sort authentication, access control and protection of mobile agents
publishDate 1998
url http://ndltd.ncl.edu.tw/handle/44386324711917431727
work_keys_str_mv AT chuchinju authenticationaccesscontrolandprotectionofmobileagents
AT qiūqíngzhì authenticationaccesscontrolandprotectionofmobileagents
AT chuchinju xíngdòngdàilǐrénchéngshìderènzhèngjízhōngjiānjiéguǒdecúnqǔkòngzhìyǔbǎohù
AT qiūqíngzhì xíngdòngdàilǐrénchéngshìderènzhèngjízhōngjiānjiéguǒdecúnqǔkòngzhìyǔbǎohù
_version_ 1716836168206647296