期刊文献+

基于TPM硬件的移动Agent安全模型研究 被引量:1

Research on Mobile Agent Secure Model Based on TPM Hardware
下载PDF
导出
摘要 主要讨论了安全强度较高的基于硬件的移动Agent安全方案。将可信计算技术与平台引入移动Agent的安全机制,基于可信硬件TPM所提供的相关安全服务实现移动Agent的主动保护机制。设计了在可信硬件平台上的移动Agent安全框架模型并进行了详细分析。 This paper discusses the secure frame of mobile agent based on hardware which has higher security intensity. Trusted computing technology and platform are introduced into mobile agent security mechanism to achieve mobile agent's active protection based on the trusted hardware TPM. The model of security on trusted hardware platform is designed and analyzedin detail.
出处 《计算机科学》 CSCD 北大核心 2008年第10期86-89,共4页 Computer Science
基金 国家863计划:可信PDA计算平台关键技术与原型系统研究(2006AA01Z442) 武汉市青年科技晨光计划:可信计算平台上的移动代理安全研究项目(200850731373)
关键词 移动AGENT 安全模型 TPM Mobile agent(MA), Secure model, Trusted platform module(TPM)
  • 相关文献

参考文献13

  • 1王红..移动agent关键技术研究[D].中国科学院计算技术研究所,2002:
  • 2柳毅..移动代理技术中若干安全问题的研究[D].西安电子科技大学,2005:
  • 3王汝传,孙开翠,张登银,杨立扬.基于JavaCard的移动代理保护的研究[J].计算机学报,2004,27(4):492-499. 被引量:8
  • 4Varadharajan V. Security enhanced mobile agents//Proc, of 7th ACM Conference on Computer and Communication Security. 2000 被引量:1
  • 5Borselius N. Mobile agent security. Electronics & Communication Engineering Journal, October 2002 被引量:1
  • 6沈志东.可信计算的关键技术与应用研究.学位论文.武汉大学,2006 被引量:1
  • 7方艳湘,沈昌祥,黄涛.分布式系统中计算安全问题的一种解决方案[J].计算机工程,2006,32(17):194-196. 被引量:2
  • 8Trusted Computing Group. TCG Specification Architecture Overview. Specification Revision 1. 4. http://www, trustedcomputinggroup, org. 2007. 8 被引量:1
  • 9Trusted Computing Group. TPM Main Part 2 TPM Structures. specification version 1.2. http://www, trustedcomputinggroup. org,2007,7 被引量:1
  • 10Wu Xiaoping, Shen Zhidong, Zhang Huanguo. The Mobile Agent Security Enhanced by Trusted Computing Teehnology//The 2^nd International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM 2006). Wuhan: IEEE Press, 2006 被引量:1

二级参考文献20

  • 1Wilhelm U.G., Staamann S.M., Buttyan L.. A pessimistic approach to trust in mobile agent platforms. IEEE Computing, 2000, 40~48 被引量:1
  • 2Fritz Hohl. A model of attacks of malicious hosts against mobile agents. In: Proceedings of the 4th Workshop on Mobile Object Systems(MOS'98): Secure Internet Mobile Computations, 1998 被引量:1
  • 3Shieh Shiuh-Pyng, Lin Chern-Tang, Wu Shianyow. Optimal assignment of mobile agents for software authorization and protection. Computer Communications, 1999, 22(6): 46~55 被引量:1
  • 4Farmer W.M., Gutman J.D., Swarup V.. Security for mobile agents: Authentication and state appraisal. In: Proceedings of the 4th European Symposium on Research in Computer Security, Rome, Italy, 1996, 118~130 被引量:1
  • 5He Yan-Xiang, Chen Shen-Meng. Design and Applications of Agent and Multi-Agent System. Wuhan: Wuhan University Press, 2001(in Chinese)(何炎祥,陈莘萌. Agent和多Agent系统的设计和应用. 武汉:武汉大学出版社,2001) 被引量:1
  • 6Zhang Yun-Yong. Mobile Agent and Its Application. Beijing: Tsinghua University Press, 2002(in Chinese)(张云勇. 移动Agent及其应用. 北京:清华大学出版社,2002) 被引量:1
  • 7Bruce Schneier. Wu Shi-Xiong, Zhu Shi-Xiong, Zhang Wen-Zheng et al. translate. Applied Cryptography: Protocols, Algorithms and Source Code in C. Second Edition. Beijing: China Machine Press, 2000(in Chinese)(Bruce Schneier著.吴世忠,祝世雄,张文政等译. 应用密码学--协议、算法与C源程序. 北京:机械工业出版社,2000) 被引量:1
  • 8Li Gong. Wang Yun-Kai, Shi Lei, Cao Shao-Wen, Kang Yong translate. Java 2 Platform Security Technology--Architecture, API Design and Realization. Beijing: China Machine Press, 2001(in Chinese)(Li Gong 著.王运凯,石磊,曹少文,康拥译. Java 2平台安全技术--结构、API设计和实现. 北京:机械工业出版社, 2001) 被引量:1
  • 9Chess D.. Security issues in mobile code systems. In: Giovanni Vigna ed.. Mobile Agent Security, LNCS 1419, Springer-Verlag, 1998, 1~14 被引量:1
  • 10Jansen W.A.. Countermeasures for mobile agent security. Computer Communications, 2000, 23(4): 1667~1676 被引量:1

共引文献8

同被引文献2

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部