The Authentication and Identity Delegation about Mobile Agent System based on Trusted Computing Platform

被引:0
|
作者
Shen, Zhidong [1 ]
Wu, Xiaoping [2 ]
机构
[1] Wuhan Univ, State Key Lab Software Engn, Int Sch Software, Wuhan 430079, Peoples R China
[2] Wuhan Univ, Sch Comp, Wuhan 430079, Peoples R China
来源
ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 2 | 2010年
关键词
mobile agent; authentication; identity delegation; Trusted Computing Platform;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the mobile agent system, the authentication and identity delegation of mobile agents are the important security problem. This paper focuses on the issues faced by a relying party when deciding to trust a CA and the certificates that it issues. The scope of this paper is limited to examining the basis for trusting a relying party places in an identity certificate signed by a CA. Some of the working group's discussion of the authentication and delegation of identity of mobile agent are also presented. This paper also gives a way to protect private keys and identity certificates in the mobile agent environment. The mobile agent and agent platform can use these certificates to build trust relationships between the CA and its registration authorities, or trust relationships between the end entities and the service providers.
引用
收藏
页码:672 / 676
页数:5
相关论文
共 50 条
  • [1] A Security Technology for Mobile Agent System Improved by Trusted Computing Platform
    Shen, Zhidong
    Tong, Qiang
    HIS 2009: 2009 NINTH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS, VOL 3, PROCEEDINGS, 2009, : 46 - +
  • [2] Integrity Measurement Enhanced Security for Mobile Agent Based on Trusted Computing Platform
    Wu, Xiaoping
    Zhang, Huanguo
    Shen, Zhidong
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4805 - +
  • [3] Trusted computing based user authentication for mobile equipment
    Zheng, Yu
    He, Da-Ke
    He, Ming-Xing
    Jisuanji Xuebao/Chinese Journal of Computers, 2006, 29 (08): : 1255 - 1264
  • [4] Trusted Computing Based Mobile DRM Authentication Scheme
    Yang, Zhen
    Fan, Kefeng
    Lai, Yingxu
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 7 - +
  • [5] Trust Management for Mobile Agent System Based on Trusted Computing Platforms
    Shen, Zhidong
    Wu, Xiaoping
    Zhan, Jing
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 717 - +
  • [6] An Improved Scheme of μTESLA Authentication based Trusted Computing Platform
    Du, Ruiying
    Wen, Song
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4711 - 4714
  • [7] A User Authentication Scheme Based on Trusted Platform for Cloud Computing
    Mo, Jiaqing
    Hu, Zhongwang
    Lin, Yuhua
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 122 - 130
  • [8] Analysis and improvement of delegation mechanism in a trusted computing platform
    Huang, Ningyu
    Zhang, Xing
    Wuhan Daxue Xuebao (Xinxi Kexue Ban)/ Geomatics and Information Science of Wuhan University, 2010, 35 (05): : 599 - 602
  • [9] Secure user authentication based on the trusted platform for mobile devices
    Kim, GeonLyang
    Lim, JaeDeok
    Kim, JeongNyeo
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2016,
  • [10] Secure user authentication based on the trusted platform for mobile devices
    GeonLyang Kim
    JaeDeok Lim
    JeongNyeo Kim
    EURASIP Journal on Wireless Communications and Networking, 2016