Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2003.10C.6.787

Digital Signature Mechanism by Mobile Agent Security Model of Distributed Web Environment  

Choi, Kil-Hwan (조선대학교 대학원 전산통계학과)
Shin, Min-Hwa (조선대학교 대학원 전산통계학과)
Bae, Sang-Hyun (조선대학교 전산통계학과)
Abstract
Telecommunication network are becomming bigger and more complex. Its difficult to manage efficiently the networks, because these networks usually have heterogeneous and inompatoble compinents. Nevertheless, current approaches to network management have focused on centralized managementstrategies based on client-server architecture. These approaches have resulted in much weakness in the real-time management, the service extensibility, and the network scalability. In thispaper, we applied the mobile agent technology to solve the above problems. Jave is a promising technology for developing mobile agent system. But, there are several problems like the service extensibility in using the Java. To solve these problems, a new approach using digital signature is suggested to authenticate mobile agent in network management environments. This approach can solve the conflict between security of the system and extensibility of the mobile code. Moreover, the system suggested in this paper show the decentralized and flexible network management solutions.
Keywords
Mobile Agent; Security; Digital Signature;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 K. Kotay, D. Kotz, Transportable Agents, In the Third International Conference on Information and Knowledge Management (CIKM '94), December, 1994
2 Sun Microsystems co., Security and Signed Applets, Available From http://java.sun.com/products/jdk/1.1/docs/guide/security/index.html
3 Jonathan T. Moore, Mobile Code Security Techniques, Available from authors, May, 1998
4 William M. Farmer, Joshua D. Guttman, and Vipin Swarup, Security for Mobile Agents : Issues and Requirements, Available from authors, 1998
5 Bennet S, Yee, A sanctuary for Mobile Agents, Available from authors, February, 1997
6 Tomas Sander and Christian F. Tschudin, Protecting Mobile Agents against Malicious Hosts, Available from authors, November, 1997
7 Colin G. Harrison, Mobile Agents: Are they a good idea?, Available from authors, March, 1995
8 Danny B. Lange and Mitsuru osima, Programming and Deploying Java Mobile Agents with Aglets, 1998
9 Giovanni Vigna, Protecting Mobile Agents through Tracing, Available from authors, 1998
10 최길환, 배상현, 자바 기반의 이동 에이전트 보안 구조 설계와 암호기능, 한국인터넷정보학회논문집, Vol.3, No.1, pp. 61-69, 2002   과학기술학회마을
11 Roch H. Glitho and Stephen Hayes, Telecommunications Management Network: Vision vs. Reality, IEEE Communication Magazine, March, 1995   DOI   ScienceOn
12 J. Case, M. Schoffstall, J Davin, 'A Simple Network Management Protocol (SNMP),' RFC 1157, May, 1990
13 Y. Yemini, The OSI Network Management Model, IEEE Communication Magazine, May, 1993   DOI   ScienceOn
14 German Goldszmidt, Yechiam Yemini, 'Distributed Management by Delegation,' In the 15th International Conference on Distributed Systems, June, 1995   DOI
15 Colin G. Harrison, David M. Chess and Aaron Kershenbaum, 'Mobile Agents: Are they a good idea?:' IBM Research Report RC 19887, Available From http://www.research.ibm.eom/xv-953-mobag-ps, 1995
16 M. Baldi, S. Gai and G. P. Picco, 'Exploiting Code Mobility in Decentralized and Flexible Network Management, In the first International Workshop on Mobile Agents (MA '97), April, 1997
17 Bieszczad, A. and Pagurek, B .. Towards plug-and-play networks with mobile code, In the International Conference for Computer Communications 97 (ICCC '97), pp.19-21, November, 1997