An Efficient Date-constraint Hierarchical Key Management Scheme for Mobile Agents

碩士 === 朝陽科技大學 === 資訊管理系碩士班 === 97 === The core competencies that a mobile agent possesses are free-roaming between different Internet environment, and autonomous environment detection and adaptation while executing the tasks that are assigned by the users. Because of these competencies, the concept...

Full description

Bibliographic Details
Main Authors: Chia-Chao Ho, 何嘉兆
Other Authors: Hsiu-Chia Ko
Format: Others
Language:en_US
Published: 2009
Online Access:http://ndltd.ncl.edu.tw/handle/02243315691057860410
Description
Summary:碩士 === 朝陽科技大學 === 資訊管理系碩士班 === 97 === The core competencies that a mobile agent possesses are free-roaming between different Internet environment, and autonomous environment detection and adaptation while executing the tasks that are assigned by the users. Because of these competencies, the concept of mobile agent is widely used in many different fields, such as Internet business, wireless communication, and information security technologies and etc... In 1983, Akl and Taylor [1] suggested the concept of superkey to resolve the key management issues faced by the mobile agent. Later in 1998, Volker and Mehrdad [2] proposed a tree base mobile agent model for access control. The proposed paper would be based upon the studies of public key and a hierarchical mobile agent model with addition of Elliptic Curve Cryptosystem (ECC). ECC enhances the operational ability of mobile agent model, because of shorter key length and higher efficiency on encryption and decryption. Besides, after using this hierarchical structure for a period of time, user will be log out of the system due to error or change in user rights. At this time, to prevent a user from illegally continuing to use the old key, the system must continue to update the key in order to change the original access rights of the key, this action could cause unnecessary error and risks and at the same time the system also needs to perform large amount of computations. Therefore, this paper proposes Date-constraint key management scheme, where a date is attached to the key, so as to give a validity period to the key. Thus, key management can be more efficient.