期刊文献+

基于PKI/PMI的移动代理安全访问 被引量:2

Security access for mobile agent based on PKI/PMI
下载PDF
导出
摘要 移动代理应用需要解决的首要问题是安全性,本文在分析移动代理系统安全需求及PKI、PMI特点的基础上,提出了一种以PKI/PMI和RBAC为基础的移动代理安全策略,利用PKI实现移动代理安全认证,将PMI属性证书与RBAC相结合,实现移动代理访问权限分配和代理服务器资源访问控制,同时详细阐述了其实现的基本过程. Security is the principal problem of mobile agent system application. The security requirements of mobile agent system and characters of PKI and PMI are analyzed in this paper, a security access based on PKI, PMI and RBAC is proposed. Mobile agent security authenticate can be realized by PKI utilization, then PMI attribute certificate and RBAC are integrated, by means of which privilege allocation and the access control of agent server are achieved, simultaneously, the basic realization process is expatiated.
出处 《华中师范大学学报(自然科学版)》 CAS CSCD 北大核心 2004年第3期284-288,共5页 Journal of Central China Normal University:Natural Sciences
基金 武汉市青年科技晨光计划基金资助项目(20035002016-04).
  • 相关文献

参考文献9

  • 1Jansen W A. Countermeasures for mobile agent security[J]. Computer Communication, 2000, 23: 1 667-1 676. 被引量:1
  • 2Montanari R, Stefanelli C, Naranker, et al. Flexible security policies for mobile agent system[J]. Microprocessors and Microsystems, 2001, 25: 93-99. 被引量:1
  • 3Roth V, Mehrada J. Access control and key management for mobile agent[J]. Computer and Graphics, 1998, 22(4): 457-461. 被引量:1
  • 4Guan Shenguei, Wang Tianhan, Ong Simheng. Migration control for mobile agent based on passport and visa[J]. Future Generation Computer System, 2003, 19: 173-186. 被引量:1
  • 5Boeyen S . X.509 : Overview of PKI and PMI frameworks(4th edition)[EB/OL]. http://www.entrust.com/resources/download.cfm/21140/509-overview.pdf, 2000. 被引量:1
  • 6Hwang Jingjang, Wu Kouchen, Liu Duenren. Access control with role attribute certificates[J]. Computer Standards and Interfaces, 2000, 22: 43-53. 被引量:1
  • 7安晓江,李大兴.PMI系统中RBAC策略的实现与管理[J].计算机工程与应用,2004,40(7):115-117. 被引量:8
  • 8谭强,黄蕾.PMI原理及实现初探[J].计算机工程,2002,28(8):187-189. 被引量:24
  • 9王汝传,徐小龙,郑晓燕,孙知信.移动代理安全机制模型的研究[J].计算机学报,2002,25(12):1294-1301. 被引量:53

二级参考文献15

  • 1[1]ITU-T Recommendation X.509.Information Technology-Open System Interconnection- The Directory:Public Key and Attribute Certificate Framework.2000 被引量:1
  • 2[2]Oppliger R,Permul G,Strauss C.Using Attribute Certificates to Imple-ment Role-based Authorization and Access Controls.http:∥www.entrust, com 被引量:1
  • 3[3]Entrust XML Strategy for Authorization. http:∥www.entrust.com 被引量:1
  • 4[4]ISO 1018 1-3.1nformation Technology - Open Systems Interconnection Security frameworks for Open System:Access Control Framework. 被引量:1
  • 5[5]Boeyen S.X.509 (2000):4th Edition:Overview of PKI & PMI Frame-works.http:∥www.entrust.com 被引量:1
  • 6[1]David Chadwich,Alexander Otenko. RBAC Policies in XML for x.509Based Privilege Management[R].SEC 2002 , Egypt , 2002-05 被引量:1
  • 7Chess D. Security Issues in mobile code systems. In: Vigna G ed. Mobile Agent Security, 1998. 1-14 被引量:1
  • 8Karnik N M, Tripathi A R. Design issues in mobile agent programming systems. IEEE Concurrency, 1998, 6(3) :52-61 被引量:1
  • 9Wilhelm U G, Saamann S M, Buttyan L. A pessimistic approach to trust in mobile agent platforms. IEEE Ccmputing, 2000,10(4) :40-48 被引量:1
  • 10Martin Schaaf, Frank Maure. Integrating Java and CORBA: A programmer' s perspective. IEEE Internet Computing, 2001,7 (1) :72-78 被引量:1

共引文献82

同被引文献11

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部