Research on Mobile Agent Security of Application Software in Open Platform

Article Preview

Abstract:

This paper analyzes the security problem and the popular security technology of Mobile Agent system. A new mechanism of Mobile Agent security system in open platform, a three tier protection model, that is code mess up, limited life time of code and data, encryption, associated with CA, used for protecting Mobile Agent from the attacks of malicious hosts is discussed. A method to deal with Mobile Agent in different level management and certification services, used for constructing hosts’ secure environment is also proposed. The security mechanism has been conducted, which shows the mode has taken into effect.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 403-408)

Pages:

1332-1336

Citation:

Online since:

November 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Wang ruchuan, Xu xiaolong, Huang haiping. Intelligent Agent and its applicaion in information network [M]. Beijing: Beijing University of Posts and Telecommunications Press, 2006: 10~105.

Google Scholar

[2] Yang Pei, Gao yang, Chen zhaoqian. A persuade method of multi-Agent and multi-issue negotiation [J]. Journal of Computer research and development. 2006, 24(6): 1149~1151.

Google Scholar

[3] Chess, D, Grosof, B, Harrison,C., Itinerant Agents for Mobile Computing, Technical Report, RC 2010(1995) IBM T.J. Watson Research Center, NY.

Google Scholar

[4] Tsehudin C.Environmental security:apoptotie functions and a way to protect them.4th Wordshop on mobile object systems:secure intemet mobile computations[C].In association with the 12 European Conference on Object—oriented Programming (ECOOP 98),1998,Brussels,Belgium.

DOI: 10.1007/3-540-49255-0_69

Google Scholar

[5] Yee B S.A sanctuary for mobile agents[C]. DARPA Workshop on Foundations for Secure Mobile Code, (1997).

Google Scholar

[6] Cao shuanglan. Analysis of Mobile Agent Security and Encryption Solution[J]. Journal of Western Science in China, 2009, 08(11): 46~48.

Google Scholar

[7] Taekyoung Kwon. Digital signature algorithm for seculing digital identities[J]. Information Processing Letters, 2003, (1): 247~252.

DOI: 10.1016/s0020-0190(01)00277-0

Google Scholar