Mobile Agent Protection and Verification in the Internet Environment

碩士 === 淡江大學 === 資訊工程學系 === 92 === For Mobile Agent, it can only be performed under trusted environment if there is no proper security. It can not be performed in the Internet due to the high risks. There are too many security issues in Internet. For example, some malicious servers or programs whi...

Full description

Bibliographic Details
Main Authors: Liao, Cheng-Horng, 廖正宏
Other Authors: Ching-Lin Wang
Format: Others
Language:zh-TW
Published: 2004
Online Access:http://ndltd.ncl.edu.tw/handle/03163301470185332740
id ndltd-TW-092TKU00392062
record_format oai_dc
spelling ndltd-TW-092TKU003920622016-06-15T04:16:53Z http://ndltd.ncl.edu.tw/handle/03163301470185332740 Mobile Agent Protection and Verification in the Internet Environment 行動代理程式在網際網路的保護與驗證 Liao, Cheng-Horng 廖正宏 碩士 淡江大學 資訊工程學系 92 For Mobile Agent, it can only be performed under trusted environment if there is no proper security. It can not be performed in the Internet due to the high risks. There are too many security issues in Internet. For example, some malicious servers or programs which attack or steal our server or original data. Hence, this thesis proposes a mobile agent application of E-commerce system and some authentication mechanisms for the system that include authentication of the legality of servers in E-commerce, authentication of the legality of mobile agents, and the verification of attacks on servers and mobile agents. By applying mobile agent and encryption/decryption technologies, this thesis will introduce how coordinator server establishes authentication mechanisms, and the authentication between servers, as well as how coordinator server verifies that each server is attacked or not? Meanwhile, this thesis also introduces the authentication between: (1) consumer/seller and server, (2) mobile agent and server, as well as the verification of attacks on mobile agent. Finally, this thesis shows on protecting and verifying the data that are collected by mobile agent, to ensure the data’s integrity, authentication, non-repudiation, confidentiality and availability, so as to achieve the targets of data security mechanism. Ching-Lin Wang 王慶林 2004 學位論文 ; thesis 79 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 淡江大學 === 資訊工程學系 === 92 === For Mobile Agent, it can only be performed under trusted environment if there is no proper security. It can not be performed in the Internet due to the high risks. There are too many security issues in Internet. For example, some malicious servers or programs which attack or steal our server or original data. Hence, this thesis proposes a mobile agent application of E-commerce system and some authentication mechanisms for the system that include authentication of the legality of servers in E-commerce, authentication of the legality of mobile agents, and the verification of attacks on servers and mobile agents. By applying mobile agent and encryption/decryption technologies, this thesis will introduce how coordinator server establishes authentication mechanisms, and the authentication between servers, as well as how coordinator server verifies that each server is attacked or not? Meanwhile, this thesis also introduces the authentication between: (1) consumer/seller and server, (2) mobile agent and server, as well as the verification of attacks on mobile agent. Finally, this thesis shows on protecting and verifying the data that are collected by mobile agent, to ensure the data’s integrity, authentication, non-repudiation, confidentiality and availability, so as to achieve the targets of data security mechanism.
author2 Ching-Lin Wang
author_facet Ching-Lin Wang
Liao, Cheng-Horng
廖正宏
author Liao, Cheng-Horng
廖正宏
spellingShingle Liao, Cheng-Horng
廖正宏
Mobile Agent Protection and Verification in the Internet Environment
author_sort Liao, Cheng-Horng
title Mobile Agent Protection and Verification in the Internet Environment
title_short Mobile Agent Protection and Verification in the Internet Environment
title_full Mobile Agent Protection and Verification in the Internet Environment
title_fullStr Mobile Agent Protection and Verification in the Internet Environment
title_full_unstemmed Mobile Agent Protection and Verification in the Internet Environment
title_sort mobile agent protection and verification in the internet environment
publishDate 2004
url http://ndltd.ncl.edu.tw/handle/03163301470185332740
work_keys_str_mv AT liaochenghorng mobileagentprotectionandverificationintheinternetenvironment
AT liàozhènghóng mobileagentprotectionandverificationintheinternetenvironment
AT liaochenghorng xíngdòngdàilǐchéngshìzàiwǎngjìwǎnglùdebǎohùyǔyànzhèng
AT liàozhènghóng xíngdòngdàilǐchéngshìzàiwǎngjìwǎnglùdebǎohùyǔyànzhèng
_version_ 1718304578867298304