中大機構典藏-NCU Institutional Repository-提供博碩士論文、考古題、期刊論文、研究計畫等下載:Item 987654321/8805
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 78818/78818 (100%)
Visitors : 34701748      Online Users : 950
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: http://ir.lib.ncu.edu.tw/handle/987654321/8805


    Title: 保護行動代理人所收集資料之研究;The Research of Mobile Agent Collected Data Protection
    Authors: 陳和樞;He-Shu Chen
    Contributors: 資訊工程研究所
    Keywords: 行動代理人;變色龍簽章;環簽章;ring signature;chameleon signature;mobile agent
    Date: 2004-06-15
    Issue Date: 2009-09-22 11:35:07 (UTC+8)
    Publisher: 國立中央大學圖書館
    Abstract: 在最近十年期間,分散式計算架構已經逐漸發展成大規模且行動式計算的形式。傳統的主從式計算系統漸漸地被一種新世代的技術 - 行動代理人所取代。幾種特色例如可以減少網路負載或自主性(Autonomy)使得這項技術很快地受到歡迎也廣泛地被應用在不同環境。 首先將介紹行動代理人及兩種行動代理人安全的分類,接著回顧一些已知的安全威脅及現今已提出的技術。此外,由於網路和通訊技術的蓬勃發展,電子商務帶來了廣大的商機和便利性,也因此變得更受歡迎且熱門。自然地,行動代理人這項技術也被應用在不同的電子商務場合。最常見的例子是行動代理人代表其擁有人去找尋並收集某樣商品的報價。如何保護這些報價的完整性是一個重要的主題。因此,一些現今已提出的技術將會被回顧。 由於現今大部份已提出的方法均使用傳統的數位簽章,因此造成隱私性(Forward Privacy)和可公開驗證的完整性(Publicly Verifiable Forward Integrity)無法同時存在單一的協定中。因此,一個改良過的協定被提出。藉由一種新的簽章技術 - 環簽章(Ring Signature),所提出的此協定可同時達到上述兩種安全特性。相關的安全性分析以及和現今技術的一些比較也會被討論。此外,當每個店家在簽章時適當地選擇其環成員(Ring members),可達成報價不能轉移的特性。 接著,由上述所提的協定提出另一個延伸。將另一種新的簽章技術 - 身份基礎式的變色龍簽章(ID-based Chameleon Signature)應用在某些電子交易場合中,同時能達成報價不能轉移的特性。如此一來將不會破壞市場行情也能避免惡性的競爭。此外,所提的此應用是相當具有實用價值的。最後將介紹一些未來可能的研究方向以及應用場合。 During the period of recent ten years, distributed computing architecture has evolved into the form of large scale and mobile computing. Traditional client/server computing systems were gradually replaced by a new generation of technique - Mobile Agent. Several features such as network load reduction or autonomy made this technique get popular rapidly and be applied widely in various environments. Mobile agent and two types of mobile agent security will be first introduced, and then some known threats and some existing solutions/techniques will be reviewed. Moreover, with the rising and flourishing development of network and communication technology, electronic commerce becomes the most popular and hottest due to the vast business opportunities and convenience it brings. Naturally, mobile agent techniques were also be applied in different electronic commerce environments. The most common example is that a mobile agent is used to find and collect various offers for a certain good on behalf of its owner. How to protect the integrity of these offers is an important topic. Hence, some proposed and well-known methods for mobile agent collected data protection will be discussed. Among most proposed methods, no single protocol can achieve forward privacy and publicly verifiable forward integrity simultaneously due to the use of traditional digital signature. And therefore, an improved collected data protection protocol will be proposed. With the ring signatures technique, the proposed protocol can achieve forward privacy and publicly verifiable forward integrity simultaneously. Related security analyses and comparisons with previous works will be discussed. Besides, the offer will not be transferable when each host selects its ring members appropriately. Moreover, an extension of the proposed protocol will be proposed. By applying the ID-based chameleon signature to some electronic transactions, the offer is not transferable as well. Besides, the proposed application neither disarranges the quotations on the market nor leads to vicious competitions. Furthermore, it is also practical for further implementations. Finally, we conclude this thesis and introduce some future research directions and possible applications.
    Appears in Collections:[Graduate Institute of Computer Science and Information Engineering] Electronic Thesis & Dissertation

    Files in This Item:

    File SizeFormat


    All items in NCUIR are protected by copyright, with all rights reserved.

    社群 sharing

    ::: Copyright National Central University. | 國立中央大學圖書館版權所有 | 收藏本站 | 設為首頁 | 最佳瀏覽畫面: 1024*768 | 建站日期:8-24-2009 :::
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 隱私權政策聲明