메뉴 건너뛰기




Volumn 31, Issue 6, 2009, Pages 1061-1068

Efficient migration access control for mobile agents

Author keywords

Access control; Chinese Remainder Theorem; Key management; Mobile agent; Security

Indexed keywords

CHINESE REMAINDER THEOREM; CONFIDENTIAL DATA; CRYPTOGRAPHIC KEY ASSIGNMENT; DATA CONFIDENTIALITY; DIGITAL TECHNIQUES; DISCRETE LOGARITHM PROBLEMS; DYNAMIC ACCESS CONTROL; DYNAMIC DEVELOPMENT; E-COMMERCE; HIERARCHICAL ACCESS CONTROL; HIERARCHICAL STRUCTURES; HIGH POTENTIAL; INTERNET ENVIRONMENT; KEY MANAGEMENT; MALICIOUS HOST; OPEN ENVIRONMENT; PROXY SIGNATURE SCHEME; RUNTIME ENVIRONMENTS; SECURITY; SECURITY AND PERFORMANCE; SECURITY SCHEME; SYMMETRIC ALGORITHMS; TRANSFER INFORMATION; USER HIERARCHY;

EID: 68849100401     PISSN: 09205489     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.csi.2008.09.039     Document Type: Article
Times cited : (15)

References (30)
  • 2
    • 85008004932 scopus 로고    scopus 로고
    • Mobile software agents for telecommunications, guest editorial
    • Karmouch A. Mobile software agents for telecommunications, guest editorial. IEEE Communications Magazine 36 No. 7 (July 1998) 24-25
    • (1998) IEEE Communications Magazine , vol.36 7 , pp. 24-25
    • Karmouch, A.1
  • 3
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • Akl S.G., and Taylor P.D. Cryptographic solution to a problem of access control in a hierarchy. ACM Transaction on Computer Systems 1 No. 3 (1983) 239-248
    • (1983) ACM Transaction on Computer Systems , vol.1 3 , pp. 239-248
    • Akl, S.G.1    Taylor, P.D.2
  • 8
    • 2342477274 scopus 로고    scopus 로고
    • Efficient access control and key management schemes for mobile agents
    • Lin I.C., Ou H.H., and Hwang M.S. Efficient access control and key management schemes for mobile agents. Computer Standards and Interfaces 26 No. 5 (2004) 423-433
    • (2004) Computer Standards and Interfaces , vol.26 , Issue.5 , pp. 423-433
    • Lin, I.C.1    Ou, H.H.2    Hwang, M.S.3
  • 9
    • 0033334588 scopus 로고    scopus 로고
    • A cryptographic key assignment scheme for dynamic access control in a user hierarchy
    • Kuo F.H., Shen V.R.L., Chen T.S., and Lai F. A cryptographic key assignment scheme for dynamic access control in a user hierarchy. IEE Proceeding on Computers & Digital Techniques 146 No. 5 (Sept. 1999) 235-240
    • (1999) IEE Proceeding on Computers & Digital Techniques , vol.146 , Issue.5 , pp. 235-240
    • Kuo, F.H.1    Shen, V.R.L.2    Chen, T.S.3    Lai, F.4
  • 10
    • 0031344109 scopus 로고    scopus 로고
    • Dynamic key management schemes for access control in a hierarchy
    • Lin C.H. Dynamic key management schemes for access control in a hierarchy. Computer Communications 20 No. 15 (Dec. 15 1997) 1381-1385
    • (1997) Computer Communications , vol.20 , Issue.15 , pp. 1381-1385
    • Lin, C.H.1
  • 11
    • 0000370732 scopus 로고    scopus 로고
    • A new dynamic key generation scheme for access control in a hierarchy
    • Hwang M.S. A new dynamic key generation scheme for access control in a hierarchy. Nordic Journal of Computing 6 No. 4 (1999) 363-371
    • (1999) Nordic Journal of Computing , vol.6 , Issue.4 , pp. 363-371
    • Hwang, M.S.1
  • 12
    • 0033751899 scopus 로고    scopus 로고
    • An asymmetric cryptographic scheme for a totally-ordered hierarchy
    • Hwang M.S. An asymmetric cryptographic scheme for a totally-ordered hierarchy. International Journal of Computer Mathematics 73 No. 4 (2000) 463-468
    • (2000) International Journal of Computer Mathematics , vol.73 , Issue.4 , pp. 463-468
    • Hwang, M.S.1
  • 13
    • 0012922503 scopus 로고    scopus 로고
    • An improvement of a dynamic cryptographic key assignment schemes in a tree hierarchy
    • Hwang M.S. An improvement of a dynamic cryptographic key assignment schemes in a tree hierarchy. Computers & Mathematics with Applications 37 No. 3 (February 1999) 19-22
    • (1999) Computers & Mathematics with Applications , vol.37 3 , pp. 19-22
    • Hwang, M.S.1
  • 15
    • 0033908596 scopus 로고    scopus 로고
    • Cryptanalysis of YCN key assignment scheme in a hierarchy
    • Hwang M.S. Cryptanalysis of YCN key assignment scheme in a hierarchy. Information Processing Letters 73 No. 3 (February 2000) 97-101
    • (2000) Information Processing Letters , vol.73 3 , pp. 97-101
    • Hwang, M.S.1
  • 16
    • 0032663530 scopus 로고    scopus 로고
    • Extension of CHW cryptographic key assignment scheme in a hierarchy
    • Hwang M.S. Extension of CHW cryptographic key assignment scheme in a hierarchy. IEE Proceedings-Computers and Digital Techniques 146 No. 4 (July 1999) 219
    • (1999) IEE Proceedings-Computers and Digital Techniques , vol.146 , Issue.4 , pp. 219
    • Hwang, M.S.1
  • 19
    • 0032121340 scopus 로고    scopus 로고
    • Access control and key management for mobile agents
    • Volker R., and Mehrdad J.S. Access control and key management for mobile agents. Computer Graphics 22 No. 4 (August 1998) 457-461
    • (1998) Computer Graphics , vol.22 , Issue.4 , pp. 457-461
    • Volker, R.1    Mehrdad, J.S.2
  • 20
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • Akl S.G., and Taylor P.D. Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems 1 No. 3 (August 1983) 239-248
    • (1983) ACM Transactions on Computer Systems , vol.1 , Issue.3 , pp. 239-248
    • Akl, S.G.1    Taylor, P.D.2
  • 21
    • 68849096323 scopus 로고    scopus 로고
    • Online] Available
    • Search-"Generalmagic," [Online] Available: http://www.generalmagic.com.
    • Search-Generalmagic
  • 22
    • 0036396975 scopus 로고    scopus 로고
    • Hierarchical access control based on Chinese remainder theorem and symmetric algorithm
    • Chen T.S., and Chung Y.F. Hierarchical access control based on Chinese remainder theorem and symmetric algorithm. Computers & Security 21 No. 6 (2002) 565-570
    • (2002) Computers & Security , vol.21 , Issue.6 , pp. 565-570
    • Chen, T.S.1    Chung, Y.F.2
  • 26
    • 32644451622 scopus 로고    scopus 로고
    • A new solution for assigning cryptographic key to control access in mobile agent environments
    • Chang C.C., and Lin C.I. A new solution for assigning cryptographic key to control access in mobile agent environments. Wireless Communications and Mobile Computing 6 No. 1 (2006) 137-146
    • (2006) Wireless Communications and Mobile Computing , vol.6 , Issue.1 , pp. 137-146
    • Chang, C.C.1    Lin, C.I.2
  • 27
    • 0035452725 scopus 로고    scopus 로고
    • Mobile agent evolution computing
    • Shih T.K. Mobile agent evolution computing. Information Sciences 137 No. 1 (2001) 53-73
    • (2001) Information Sciences , vol.137 1 , pp. 53-73
    • Shih, T.K.1
  • 29
    • 0001943763 scopus 로고    scopus 로고
    • Time limited Black Box Security: protecting mobile agent from malicious hosts
    • Springer Verlag, Berlin
    • Hohl F. Time limited Black Box Security: protecting mobile agent from malicious hosts. Lecture Notes in Computer Science-Mobile Agents and Security 1419 (1998), Springer Verlag, Berlin 92-113
    • (1998) Lecture Notes in Computer Science-Mobile Agents and Security , vol.1419 , pp. 92-113
    • Hohl, F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.