Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Communications of the ACM
Cryptanalysis of YCN key assignment scheme in a hierarchy
Information Processing Letters
Cryptographic solution to a problem of access control in a hierarchy
ACM Transactions on Computer Systems (TOCS)
Mobile agent evolution computing
Information Sciences: an International Journal
A new dynamic key generation scheme for access control in a hierarchy
Nordic Journal of Computing
Security for Mobile Agents: Authentication and State Appraisal
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
Security Issues in Mobile Agent Technology
FTDCS '99 Proceedings of the 7th IEEE Workshop on Future Trends of Distributed Computing Systems
A Security Architecture for Mobile Agents in Ajanta
ICDCS '00 Proceedings of the The 20th International Conference on Distributed Computing Systems ( ICDCS 2000)
Index Calculation Attacks on RSA Signature and Encryption
Designs, Codes and Cryptography
Wireless Communications & Mobile Computing
Itinerant Agents for Mobile Computing
IEEE Communications Surveys & Tutorials
Research: Dynamic key management schemes for access control in a hierarchy
Computer Communications
Mobile Software Agents for Telecommunications
IEEE Communications Magazine
Mobile Agent Application and Integration in Electronic Anamnesis System
Journal of Medical Systems
A Mobile Agent Approach for Secure Integrated Medical Information Systems
Journal of Medical Systems
Improved migration for mobile computing in distributed networks
Computer Standards & Interfaces
Efficient communication architecture for the C2C agent
Computer Standards & Interfaces
Hi-index | 0.00 |
The speed and convenience of the Internet has facilitated dynamic development in electronic commerce in recent years. E-commerce technologies and applications are widely studied by expert researchers. Mobile agent is considered to have high potential in e-commerce; it has been attracting wide attention in recent years. Mobile agent has high autonomy and mobility; it can move unbridled in different runtime environments carrying out assigned tasks while automatically detecting its current environment and responding accordingly. The above qualities make mobile agent very suitable for use in e-commerce. The Internet is an open environment, but transfer of confidential data should be conducted only over a secure environment. So, to transfer information over the Internet, a secure Internet environment is absolutely essential. Therefore, the security of present Internet environment must be improved. During its execution, a mobile agent needs to roam around on the Internet between different servers, and it may come in contact with other mobile agents or hosts; it may also need to interact with them. So, a mobile agent might come to harm when it meets a malicious host, and the confidentiality of data could also be compromised. To tackle the above problems, this paper proposes a security scheme for mobile agents. It is designed to ensure the safety of mobile agents on the Internet, and it also has access control and key management to ensure security and data confidentiality. Volker and Mehrdad [R. Volker, J.S. Mehrdad, Access Control and Key Management for Mobile Agents, ''Computer Graphics'', Vol. 22, No. 4, August 1998, pp. 457-461] have already proposed an access control and key management scheme for mobile agents, but it needs large amount of space. So, this paper proposes a new scheme that uses the concepts of Chinese Remainder Theorem [F.H. Kuo, V.R.L. Shen, T.S. Chen, F. Lai, A Cryptographic Key Assignment Scheme for Dynamic Access Control in a User Hierarchy, ''IEE Proceeding on Computers & Digital Techniques'', Vol. 146, No. 5, Sept. 1999, pp. 235-240., T.S. Chen, Y.F. Chung, Hierarchical Access Control Based on Chinese Remainder Theorem and Symmetric Algorithm, ''Computers & Security'', Vol. 21, No. 6, 2002, pp. 565-570., U.P. Lei, S.C. Wang, A Study of the Security of Mambo et al.'s Proxy Signature Scheme Based on the Discrete Logarithm Problem, June 2004], hierarchical structure and Superkey [S.G. Akl, P.D. Taylor, Cryptographic Solution to a Problem of Access Control in a Hierarchy, ''ACM Transactions on Computer Systems'', Vol. 1, No. 3, August 1983, pp. 239-248]. A security and performance analysis of the proposed scheme shows that the scheme effectively protects mobile agents.