Access control and key management for mobile agents
نویسندگان
چکیده
Security is a fundamental precondition for the acceptance of mobile agent systems. In this paper we present a mobile agent structure which supports authentication, security management and access control for mobile agents.
منابع مشابه
Efficient Key Management Scheme for Hierarchical Access Control in Mobile Agents
Mobile agents have great potential for increasing the realized benefit for a variety of e-commerce applications. However, enabling the mobile agent to safely travel over the open and uncontrollable Internet is necessary to protect the contents of a mobile agent. Recently, many agent structures that manage the keys needed to provide the access control mechanism for mobile agents have been develo...
متن کاملAn Overview of Group Key Management Issues in IEEE 802.16e Networks
The computer industry has defined the IEEE 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. As the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. IEEE 802.16e uses Multica...
متن کاملنقش نرم افزارهای سلامت همراه در تسهیل خودمراقبتی
Abstract Introduction: The use of mobile technology as mobile health is rapidly expanding to track and improve human health. The advent of smartphone technology alongside interactive displays has provided quick access, easy access, transmission and tracking information for patients and service providers. The patients can better manage and control their illness and health by using...
متن کاملEfficient Date-constraint Access Control and Key Management Scheme for Mobile Agents
A mobile agent has become a competent software nowadays because of its significant abilities. It can roam freely in different Internet environments, adapt itself to various types of online servers totally associated to the characteristics of said server, and detect its environment and automatic adaptation to the environment while executing the assigned tasks by users. Due to these competencies,...
متن کاملAccess and Mobility Policy Control at the Network Edge
The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computers & Graphics
دوره 22 شماره
صفحات -
تاریخ انتشار 1998