淡江大學機構典藏:Item 987654321/37211
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 62822/95882 (66%)
Visitors : 4013656      Online Users : 877
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://tkuir.lib.tku.edu.tw/dspace/handle/987654321/37211


    Title: Mobile agent protection and verification in the internet environment
    Authors: Wang, Ying-hong;Wang, Ching-Lin;Liao, Cheng-Horng
    Contributors: 淡江大學資訊工程學系
    Date: 2004-09
    Issue Date: 2010-01-11 12:37:24 (UTC+8)
    Publisher: IEEE
    Abstract: For mobile agent, it can only be performed under trusted environment if there is no proper security. It can not be performed in the Internet due to the high risks. There are too many security issues in Internet. For example, some malicious servers or programs which attack or steal our server or original data. Hence, this paper proposes a mobile agent application of E-commerce system and some authentication mechanisms for the system that include authentication of the legality of servers in E-commerce, authentication of the legality of mobile agents, and the verification of attacks on servers and mobile agents. By applying mobile agent and encryption/ decryption technologies, this paper will introduce how coordinator server establishes authentication mechanisms, and the authentication between servers, as well as how coordinator server verifies that each server is attacked or not? Meanwhile, this paper also introduces the authentication between: (1) buyer/ seller and server, (2) mobile agent and server, as well as the verification of attacks on mobile agent. Finally, this paper focuses on protecting and verifying the data that are collected by mobile agent, to ensure the data's integrity, authentication, non-repudiation, confidentiality and availability, so as to achieve the targets of data security mechanism.
    Relation: Computer and Information Technology, 2004. CIT '04. The Fourth International Conference on, pp.482-487
    DOI: 10.1109/CIT.2004.1357241
    Appears in Collections:[Graduate Institute & Department of Computer Science and Information Engineering] Proceeding

    Files in This Item:

    File Description SizeFormat
    index.html0KbHTML280View/Open
    index.html0KbHTML136View/Open
    Mobile agent protection and verification in the internet environment.pdf667KbAdobe PDF248View/Open

    All items in 機構典藏 are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback