Please use this identifier to cite or link to this item: http://hdl.handle.net/11455/68574
DC FieldValueLanguage
dc.contributor.authorLin, L.C.en_US
dc.contributor.authorOu, H.H.en_US
dc.contributor.authorHwang, M.S.en_US
dc.date2004zh_TW
dc.date.accessioned2014-06-11T05:57:01Z-
dc.date.available2014-06-11T05:57:01Z-
dc.identifier.issn0920-5489zh_TW
dc.identifier.urihttp://hdl.handle.net/11455/68574-
dc.description.abstractThe mobile agent is a promising trend of technology. It is designed for roaming around the Internet and to achieve the goal of autonomy. However, the Internet is an open and, in many cases, a hostile environment. Thus, how to enable the mobile agent to travel through the Internet in safety is an important issue. Recently, Volker and Mehrdad have proposed a structure that supports key management and access control for mobile agent. However, a large amount of storage for storing the secret keys is required in their scheme. In this paper, we will improve their structure and present two novel methods for key management and access control in a hierarchy. According to our security and performance analysis, our proposed scheme is more suitable for mobile agent environments. (C) 2003 Elsevier B.V. All rights reserved.en_US
dc.language.isoen_USzh_TW
dc.relationComputer Standards & Interfacesen_US
dc.relation.ispartofseriesComputer Standards & Interfaces, Volume 26, Issue 5, Page(s) 423-433.en_US
dc.relation.urihttp://dx.doi.org/10.1016/j.csi.2003.11.010en_US
dc.subjectagent authenticationen_US
dc.subjectaccess controlen_US
dc.subjectmobile agenten_US
dc.subjectkey managementen_US
dc.subjectsecurityen_US
dc.subjectassignment schemeen_US
dc.subjecthierarchyen_US
dc.subjectimprovementen_US
dc.titleEfficient access control and key management schemes for mobile agentsen_US
dc.typeJournal Articlezh_TW
dc.identifier.doi10.1016/j.csi.2003.11.010zh_TW
Appears in Collections:期刊論文
文件中的檔案:

取得全文請前往華藝線上圖書館



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.