English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 113656/144643 (79%)
Visitors : 51739493      Online Users : 538
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    政大機構典藏 > 資訊學院 > 資訊科學系 > 學位論文 >  Item 140.119/32627
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/32627


    Title: 建立一個以服務多代理者系統為主的公鑰匙架構
    Building a Public Key Infrastructure for Multi-Agent Systems
    Authors: 唐朝緯
    Chao-Wei Tang
    Contributors: 胡毓忠
    Yuh-Jong Hu
    唐朝緯
    Chao-Wei Tang
    Keywords: Public Key Infrastructure
    Multi-Agent Systems
    Security
    Authentication
    Authorization
    Date: 2003
    Issue Date: 2009-09-17 13:53:13 (UTC+8)
    Abstract: 代理者(Agent)是一個自主性的軟體程式,可以幫助代表人類在網際網路上從事各種的電子化服務(E-Service)。由於目前多代理者系統缺少了安全管理的機制,以致於目前為止代理者代表人類在網上從事活動的行為還不被大家接受。因此,我們提出了一套以代理者為導向的公鑰匙架構(Agent-Oriented Public Key Infrastructure, APKI),各式各樣的數位憑證被產生、儲存、註銷及驗證,以滿足不同存取控制的需求。例如,代理者的認證是以代理者身份憑證為基礎,而授權的部分則以授權憑證或屬性憑證來做驗證。透過這些數位憑證,我們可以在虛擬網路上的代理者之間建立一條信任路徑,一個安全的電子化服務的實際應用範例將會以此架構實作及呈現出來,以驗證我們所提架構的可行性。
    Agent is autonomous software that mediates e-service for human on the Internet. The acceptance of agent-mediated e-service (AMES) is very slow for the lacking of security management infrastructure for multi-agent system. Therefore we proposed an agent-oriented public key infrastructure (APKI) for multi-agent e-service. In this APKI, a taxonomy of digital certificates are generated, stored, verified, and revoked to satisfy different access and delegation control purposes. Agent identity certificate was designed for agent’s authentication whereas attributed and agent authorization certificates were proposed for agent’s authorization and delegation. Using these digital certificates, we establish agent trust relationships on the cyberspace. A trusted agent-mediated e-service scenario will be shown to demonstrate the feasibility of our APKI.
    Reference: 參考文獻
    [1] Adams, C., Burmester, M. et. Al., 2000, Which PKI(Public Key Infrastructure) is the right one?, CCS’00 Conference, Athens,Greece.
    [2] Ellison, Carl M., 2000, Naming and Certificates. Computers, Freedom and Privacy, 2000.
    [3] Ellison, M. Carl et al.. Simple Public Key Certificate (SPKI). http://clark.net/pub/cme/spki.txt
    [4] FIPA OS. http://fipa-os.sourceforge.net/.
    [5] FIPA Standards. http://www.fipa.org.
    [6] Foner, N. Leonard. 1996. A Security Architecture fo Multi-Agent Matchmaking, Proceeding of the Second International Conference on Multi-Agent System.
    [7] Finin, Tim, James Mayfield, Chelliah Thirunavukkarasu. 1995. Secret Agents – A security Architecture for the KAML Agent Communication Language. CIKM’95 Intelligent Information Agents Workshop. Baltimore, December 1995.
    [8] He, Qi, Katia P. Sycara, and Timothy W. Finin. 1998. Personal Security Agent: KQML-Based PKI. Proceedings of the Second International Conference on Autonomous Agents.
    [9] Hu, Yuh-Jong. 2003. Trusted Agent-Mediated E-Commerce Transaction Services via Digital Certificate Management, Electronic Commerce Research, Vol. 3, Issues 3-4, July-October.2003.
    [10] Hu, Yuh-Jong. 2001. Some Thoughts on Agent Trust and Delegation. The Fifth International Conference on Autonomous Agents. May 28 – June 1, 2001. Montreal, Canada.
    [11] Jennings, N., Sycara, K. and Wooldridge, M., 1998, A Roadmap of Agent Research and Development, Journal of Autonomous Agents and Multi-Agent Systems.
    [12] Klusch, M. and Sycara, K., Brokering and Matchmaking for Coordination of Agent Societies: A Survey. Coordination of Internet Agents. Springer, 2001.
    [13] Lamsal, Pradip., 2001, Understanding Trust and Security. citeseer.nj.nec.com/lamsal01understanding.html, 2001
    [14] Lloyd, S., PKI Forum, 2002, White paper: Understanding Certification Path Construction. PKI Forum’s Technical Group(TWG), 2002.
    [15] Maurer, Ueli., 1996, Modeling a Public-Key Infrastructure. European Symposium on Research in Computer Security(ESORICS’96).
    [16] Perlman, R., Sun Microsystems, 1999, An Overview of PKI Trust Models. IEEE Network November/December 1999.
    [17] PKCS (Public Key Crypto System), RSA Laboratories. http://www.rsa.com/rsalabs/pubs/PKCS/
    [18] PKI white paper, http://www.pkiforum.com
    [19] Polk, W. Timothy et al.. 1996. Public Key Infrastructure: From Theory to Implementation. http://csrc.ncsl.nist.gov/pki/panel/overview.html. NIST.
    [20] Public-Key Infrastructure (X.509) (pkix), http://www.ietf.org/html.charters/pkix-charter.html
    [21] Rivest, R. and Bulter Lampson. SDSI – A Simple Distributed Security Infrastructure. http://theory.lcs.mit.edu/cis/sdsi.html
    [22] Smith, Sean and Marchesini, John. 2002. Virtual Hierarchies-An Architecture for Building and Maintaining Efficient and Resilient Trust Chains. www.dartmouth.edu/~pkilab/slides/NORDSEC6Nov02.pdf , Nov. 2002.
    [23] UDDI White paper, http://www.uddi.org/whitepapers.html
    [24] Wong, H. Chi and Katia Sycara. 1999. Adding Security and Trust to Multi-Agent Systems. Proceedings of Autonomous Agents ’99 ( Workshop on Deception, Fraud and Trust in Agent Societies), May 1999, Seattle, Washington.
    [25] Zimmermann, R. Philip. 1995.The Official PGP User’s Guide , MIT press
    Description: 碩士
    國立政治大學
    資訊科學學系
    90753017
    92
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0090753017
    Data Type: thesis
    Appears in Collections:[資訊科學系] 學位論文

    Files in This Item:

    File Description SizeFormat
    75301701.pdf49KbAdobe PDF2805View/Open
    75301702.pdf58KbAdobe PDF2727View/Open
    75301703.pdf63KbAdobe PDF2844View/Open
    75301704.pdf95KbAdobe PDF2706View/Open
    75301705.pdf102KbAdobe PDF2948View/Open
    75301706.pdf121KbAdobe PDF21143View/Open
    75301707.pdf249KbAdobe PDF21265View/Open
    75301708.pdf206KbAdobe PDF21342View/Open
    75301709.pdf461KbAdobe PDF2990View/Open
    75301710.pdf159KbAdobe PDF2872View/Open
    75301711.pdf493KbAdobe PDF21038View/Open
    75301712.pdf100KbAdobe PDF2654View/Open
    75301713.pdf45KbAdobe PDF2740View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback