Efficient Access Control and Key Management for Mobile Agents
碩士 === 逢甲大學 === 資訊電機工程碩士在職專班 === 94 === The mobile agent is designed for roaming around the internet and to achieve the goal of autonomy. With rapid growth of internet application, it will become a new promising technique. There are many application paradigms about mobile agents had proposed. Howeve...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2006
|
Online Access: | http://ndltd.ncl.edu.tw/handle/73747443919624679179 |
id |
ndltd-TW-094FCU05392058 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-094FCU053920582015-12-11T04:04:18Z http://ndltd.ncl.edu.tw/handle/73747443919624679179 Efficient Access Control and Key Management for Mobile Agents 有效率地提供行動代理人存取控制與金鑰管理的方法 Chun-Hsu Huang 黃君旭 碩士 逢甲大學 資訊電機工程碩士在職專班 94 The mobile agent is designed for roaming around the internet and to achieve the goal of autonomy. With rapid growth of internet application, it will become a new promising technique. There are many application paradigms about mobile agents had proposed. However, a lot of security issues arose continuously. Security is still a fundamental precondition for the application of mobile agent systems. In order to enable the mobile agent to travel through the internet in safety, a suitable access control mechanism is indispensable to mobile agents. Volker and Mehrdad have proposed a tree-based structure that supports key management and access control for mobile agents. However, a large amount of storage for storing the secret keys is required in their scheme. Lin, Ou and Hwang proposed a RSA-based hierarchy structure to improve the drawbacks of Volker and Mehrdad’s scheme. The schemes of Lin-Ou-Hwang could reduce some of the mobile code, but still suffer from high computational cost. If the network service host has many mobile agents visited in the meantime; or the mobile agent is applied in mobile devices, these cases above-mention will diminish the efficiency and facility in application of mobile agents. In this paper, we propose an efficient hierarchy structure based on CRT (Chinese Remainder Theorm) for access control and key management for mobile agents. Our analysis shows that not only does our security match previous requirements but also reduce the computational cost of deriving secret keys significantly, so it is quite obvious that our scheme is more efficient than previous schemes. Wei-Bin Lee 李維斌 2006 學位論文 ; thesis 38 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 逢甲大學 === 資訊電機工程碩士在職專班 === 94 === The mobile agent is designed for roaming around the internet and to achieve the goal of autonomy. With rapid growth of internet application, it will become a new promising technique. There are many application paradigms about mobile agents had proposed. However, a lot of security issues arose continuously. Security is still a fundamental precondition for the application of mobile agent systems. In order to enable the mobile agent to travel through the internet in safety, a suitable access control mechanism is indispensable to mobile agents. Volker and Mehrdad have proposed a tree-based structure that supports key management and access control for mobile agents. However, a large amount of storage for storing the secret keys is required in their scheme. Lin, Ou and Hwang proposed a RSA-based hierarchy structure to improve the drawbacks of Volker and Mehrdad’s scheme. The schemes of Lin-Ou-Hwang could reduce some of the mobile code, but still suffer from high computational cost. If the network service host has many mobile agents visited in the meantime; or the mobile agent is applied in mobile devices, these cases above-mention will diminish the efficiency and facility in application of mobile agents. In this paper, we propose an efficient hierarchy structure based on CRT (Chinese Remainder Theorm) for access control and key management for mobile agents. Our analysis shows that not only does our security match previous requirements but also reduce the computational cost of deriving secret keys significantly, so it is quite obvious that our scheme is more efficient than previous schemes.
|
author2 |
Wei-Bin Lee |
author_facet |
Wei-Bin Lee Chun-Hsu Huang 黃君旭 |
author |
Chun-Hsu Huang 黃君旭 |
spellingShingle |
Chun-Hsu Huang 黃君旭 Efficient Access Control and Key Management for Mobile Agents |
author_sort |
Chun-Hsu Huang |
title |
Efficient Access Control and Key Management for Mobile Agents |
title_short |
Efficient Access Control and Key Management for Mobile Agents |
title_full |
Efficient Access Control and Key Management for Mobile Agents |
title_fullStr |
Efficient Access Control and Key Management for Mobile Agents |
title_full_unstemmed |
Efficient Access Control and Key Management for Mobile Agents |
title_sort |
efficient access control and key management for mobile agents |
publishDate |
2006 |
url |
http://ndltd.ncl.edu.tw/handle/73747443919624679179 |
work_keys_str_mv |
AT chunhsuhuang efficientaccesscontrolandkeymanagementformobileagents AT huángjūnxù efficientaccesscontrolandkeymanagementformobileagents AT chunhsuhuang yǒuxiàolǜdetígōngxíngdòngdàilǐréncúnqǔkòngzhìyǔjīnyàoguǎnlǐdefāngfǎ AT huángjūnxù yǒuxiàolǜdetígōngxíngdòngdàilǐréncúnqǔkòngzhìyǔjīnyàoguǎnlǐdefāngfǎ |
_version_ |
1718147593567993856 |