The Authentication and Identity Delegation about Mobile Agent System based on Trusted Computing Platform

被引:0
作者
Shen, Zhidong [1 ]
Wu, Xiaoping [2 ]
机构
[1] Wuhan Univ, State Key Lab Software Engn, Int Sch Software, Wuhan 430079, Peoples R China
[2] Wuhan Univ, Sch Comp, Wuhan 430079, Peoples R China
来源
ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 2 | 2010年
关键词
mobile agent; authentication; identity delegation; Trusted Computing Platform;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the mobile agent system, the authentication and identity delegation of mobile agents are the important security problem. This paper focuses on the issues faced by a relying party when deciding to trust a CA and the certificates that it issues. The scope of this paper is limited to examining the basis for trusting a relying party places in an identity certificate signed by a CA. Some of the working group's discussion of the authentication and delegation of identity of mobile agent are also presented. This paper also gives a way to protect private keys and identity certificates in the mobile agent environment. The mobile agent and agent platform can use these certificates to build trust relationships between the CA and its registration authorities, or trust relationships between the end entities and the service providers.
引用
收藏
页码:672 / 676
页数:5
相关论文
共 50 条
[21]   Using trusted computing for privacy preserving keystroke-based authentication in smartphones [J].
Mohammad Nauman ;
Tamleek Ali ;
Azhar Rauf .
Telecommunication Systems, 2013, 52 :2149-2161
[22]   Using trusted computing for privacy preserving keystroke-based authentication in smartphones [J].
Nauman, Mohammad ;
Ali, Tamleek ;
Rauf, Azhar .
TELECOMMUNICATION SYSTEMS, 2013, 52 (04) :2149-2161
[23]   On the Security of A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing [J].
Salman Shamshad ;
Minahil Rana ;
Khalid Mahmood ;
Muhammad Khurram Khan ;
Mohammad S. Obaidat .
Wireless Personal Communications, 2022, 124 :283-292
[24]   On the Security of A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing [J].
Shamshad, Salman ;
Rana, Minahil ;
Mahmood, Khalid ;
Khan, Muhammad Khurram ;
Obaidat, Mohammad S. .
WIRELESS PERSONAL COMMUNICATIONS, 2022, 124 (01) :283-292
[25]   Device Fingerprint and Mobile Agent based Authentication Technique in Wireless Networks [J].
Kumar, Umesh ;
Gambhir, Sapna .
INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2018, 11 (03) :33-48
[26]   An Efficient Identity Authentication Scheme With Provable Security and Anonymity for Mobile Edge Computing [J].
Xu, Yuan ;
Zhou, Yanwei ;
Yang, Bo ;
Qiao, Zirui ;
Wang, Zhaolong ;
Xia, Zhe ;
Zhang, Mingwu .
IEEE SYSTEMS JOURNAL, 2023, 17 (01) :1012-1023
[27]   A Context-Aware Authentication System for Mobile Cloud Computing [J].
Benzekki, Kamal ;
El Fergougui, Abdeslam ;
ElBelrhiti ElAlaoui, Abdelbaki .
PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING IN DATA SCIENCES (ICDS2017), 2018, 127 :379-387
[28]   A Secure Distributed Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET [J].
Wang Xingfu ;
Lu Qiwei ;
Xiong Yan ;
Miao Fuyou ;
Huang Wenchao ;
Liu Tao ;
Wu Xuangou .
CHINESE JOURNAL OF ELECTRONICS, 2014, 23 (02) :284-290
[29]   A Secure Distributed Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET [J].
WANG Xingfu ;
LU Qiwei ;
XIONG Yan ;
MIAO Fuyou ;
HUANG Wenchao ;
LIU Tao ;
WU Xuangou .
Chinese Journal of Electronics, 2014, 23 (02) :284-290
[30]   A mobile agent based middleware for grid computing [J].
Peng, DW ;
He, YX .
DCABES 2004, PROCEEDINGS, VOLS, 1 AND 2, 2004, :268-273