| 研究生: |
陳俊延 Chen, Chun-Yen |
|---|---|
| 論文名稱: |
行動代理者之安全機制 Mobile Agent Security Mechanism |
| 指導教授: |
王宗一
Wong, Tzong-I |
| 學位類別: |
碩士 Master |
| 系所名稱: |
工學院 - 工程科學系 Department of Engineering Science |
| 論文出版年: | 2004 |
| 畢業學年度: | 92 |
| 語文別: | 中文 |
| 論文頁數: | 76 |
| 中文關鍵詞: | 行動代理者 |
| 外文關鍵詞: | mobile agent |
| 相關次數: | 點閱:94 下載:2 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
近幾年來,由於網際網路的發達,越來越多人使用網際網路來找
尋其想要得到的資料,更進一步的想要藉由網際網路來達成購物的行
為,及查詢價格等商業化行為,使得電子商務應運而生。而行動代理
者由於具有遷移的特性,也使得行動代理者的技術可以大幅的應用在
電子商務之中,然而,電子商務的商業行為大多需要再保密的情況下
完成交易,也使得行動代理者運用在電子商務上的安全更顯得重要許
多,雖然行動代理者的研究已非實驗性的階段,已有許多行動代理者
系統運用在電子商務上,也有許多安全系統架構在其實作的行動代理
者系統上,雖然如此,行動代理者的安全防護問題,還是一個棘手的
問題,其中最大的問題,在於執行主機與行動代理者之間安全上的問
題。
本論文主要提出一套完整行動代理者的安全防護機制,並且在不
妨礙原本系統架構之流程下,來實作整個系統,以達到系統之相容
性。當我們利用行動代理者系統來運用商業的行為 , 例如查詢機
票,或進一步利用行動代理者來運作商業之行為時,可以讓使用者在
發射行動代理者之後,即不需要擔心行動代理者所帶的使用者資訊會
被其他人所擷取,或是竊聽,或更進一步的竄改使用者原先預期讓行
動代理者執行之服務,並且在行動代理者執行使用者所賦予的任務之
後,能夠安全的交給使用者手中。
本系統是以MACE(Mobile Agent Carrier Environment)作為行
動代理者的運作環境,以不違反MACE 系統運作原則上,來實作安全
防護系統,並提出一套支援多重服務的安全協定。
In order for mobile agents to be accepted as a basic technology for
enabling electronic commerce, proper security mechanisms must be
developed. Hosts must be protected from malicious agents , agents must
be protected from other agents and also agents must be protected from
malicious hosts. For solving the first three problems , existing technology
from operating systems and distributed systems research can be used. The
last problem is new and specific to the mobile agent paradigm and it is
much harder to solve. Due to this problem,many say that mobile agents
are not ready for the e-commerce.
The main purpose of this thesis is to build a complete mobile agent
security mechanism for supporting Mobile Agent Carrier Environment.
Security problem including malicious host and malicious agent can be
solved with this two-layered security mechanism. Through this security
mechanism, e-commerce like booking flight tickets is much more safer
when users surf on the net. Users are not worried about sniffing or
modifications on data when dispatch mobile agents in the mobile agent
system. Any modification or relaying of mobile agent can be found in this
mechanism.
[1] William Stallings , “Network and Internetwork Security: Principle and
practice”,Prentice Hall, 1995.
[2] Vijay Varadharajan “Security Enhanced Mobile Agents”, In Proceedings of
the 7th ACM conference on Computer and communications security,
pp.200-209, 2000.
[3] P. Kotzanikolaou, M. Burmester & V. Chrissikopoulos. “Secure Transactions
with Mobile Agents in Hostile Environments.” 2000 LNCS 1841, pp 289-297.
[4] Sheng-Uei Guan, Tianhan Wang, Sim-Heng On “A secure approach for
mobile agent migration control ”, In Proceedings of the ISCC 2002,
pp.741-746.
[5] Giovanni Vigna。 "Cryptographic traces for mobile agents。"1998 LNCS
1419, Springer-Verlag, 1998
[6] Vogler, H.; Kunkelmann, T. and Moschgath, M.-L., "An Approach for
Mobile Agent Security and Fault Tolerance using Distributed Transactions." Int.
Conf. Parallel and Distributed Systems (ICPADS'97), IEEE Computer Society
Press, 1997.
[7] Tomoya Taka, Tadanori Mizuno, Takashi Watanabe. "A Model of Mobile
Agent Services Enhanced for Resource Restrictions and Security." ICPADS 1998:
274-281. 1998.
[8] Wang T.I. “A Mobile Agent Carrier Environment for Mobile Information
Retrieval”, 11-th International.
[9] Wang ,T.I. “A Mobile Agent Carrier Environment with Mobile Computing
Facilities”, IIP: International Conference on Intelligent Information Processing,
The 16th IFIP World Computer Congress.21~25/08, 2000, Beijing.
[10] Wang , T.I., A Mobile Agent Carrier Environment, Proc. International
Computer Symposium, ICS2000, 6-8 December, 2000, Chiayi,
Taiwan, R.O.C.
[11] Government Certification Authority, URL = http://www。pki。gov。tw/
[12] 工研院電通所電子商務介紹網站:http://w100set.ccl.itri.org.tw/,
[13] Giovanni Vigna(Ed.), “Mobile Agents and Security”, Springer 1999
[14] M.Benantar ”The Internet Public Key Infrastructure”,IBM System
Journal`,Vol.40,No.3,pp.648-665,2001.
76
[15] A.Corradi,R.Montanari and C.Stefanelli,”Mobile Agents Protection in the
Internet Environment,”Proceeding of the Computer Software and Applications
Conference COMPSAC’99,Arizona,pp.80-85,1999.
[16]Jaco van der Merwe,S.H.Solms,”Electronic Commerce with Secure Intelligent
Trade Agents”Journal of Computer & Security,Vol.17,No.5,pp.435-446,1998.
[17]W.A.Jansen,”Countermeasure for Mobile Agent Security”NIST Special
Publication 800-19,National Institude of Standards and Technology Physics
Laboratory,2000.
[18]賴溪松、韓亮、張真誠,近代密碼學及其應用,台北,松崗電腦圖書資料股
份有限公司,民國八十四年。
[19]張真誠,林祝興,江季翰,電子商務安全,台北,松崗電腦圖書資料股份有
限公司,民國八十九年。
[20]林祝興,張真誠,電子商務安全技術與應用,台北,旗標出版股份有限公司,
民國九十二年。
[21]周晉立:"Mobile Agent Carrier Environment",國立成功大學工程科學
系研究所碩士論文,June 1998
[22]Wang,T.I,"以行動代理者支援行動資訊擷取",第五屆人工智慧與應用研
討,Taipei,17/Nov.2000.