Loading...
|
Please use this identifier to cite or link to this item:
https://nccur.lib.nccu.edu.tw/handle/140.119/32627
|
Title: | 建立一個以服務多代理者系統為主的公鑰匙架構 Building a Public Key Infrastructure for Multi-Agent Systems |
Authors: | 唐朝緯 Chao-Wei Tang |
Contributors: | 胡毓忠 Yuh-Jong Hu 唐朝緯 Chao-Wei Tang |
Keywords: | Public Key Infrastructure Multi-Agent Systems Security Authentication Authorization |
Date: | 2003 |
Issue Date: | 2009-09-17 13:53:13 (UTC+8) |
Abstract: | 代理者(Agent)是一個自主性的軟體程式,可以幫助代表人類在網際網路上從事各種的電子化服務(E-Service)。由於目前多代理者系統缺少了安全管理的機制,以致於目前為止代理者代表人類在網上從事活動的行為還不被大家接受。因此,我們提出了一套以代理者為導向的公鑰匙架構(Agent-Oriented Public Key Infrastructure, APKI),各式各樣的數位憑證被產生、儲存、註銷及驗證,以滿足不同存取控制的需求。例如,代理者的認證是以代理者身份憑證為基礎,而授權的部分則以授權憑證或屬性憑證來做驗證。透過這些數位憑證,我們可以在虛擬網路上的代理者之間建立一條信任路徑,一個安全的電子化服務的實際應用範例將會以此架構實作及呈現出來,以驗證我們所提架構的可行性。 Agent is autonomous software that mediates e-service for human on the Internet. The acceptance of agent-mediated e-service (AMES) is very slow for the lacking of security management infrastructure for multi-agent system. Therefore we proposed an agent-oriented public key infrastructure (APKI) for multi-agent e-service. In this APKI, a taxonomy of digital certificates are generated, stored, verified, and revoked to satisfy different access and delegation control purposes. Agent identity certificate was designed for agent’s authentication whereas attributed and agent authorization certificates were proposed for agent’s authorization and delegation. Using these digital certificates, we establish agent trust relationships on the cyberspace. A trusted agent-mediated e-service scenario will be shown to demonstrate the feasibility of our APKI. |
Reference: | 參考文獻 [1] Adams, C., Burmester, M. et. Al., 2000, Which PKI(Public Key Infrastructure) is the right one?, CCS’00 Conference, Athens,Greece. [2] Ellison, Carl M., 2000, Naming and Certificates. Computers, Freedom and Privacy, 2000. [3] Ellison, M. Carl et al.. Simple Public Key Certificate (SPKI). http://clark.net/pub/cme/spki.txt [4] FIPA OS. http://fipa-os.sourceforge.net/. [5] FIPA Standards. http://www.fipa.org. [6] Foner, N. Leonard. 1996. A Security Architecture fo Multi-Agent Matchmaking, Proceeding of the Second International Conference on Multi-Agent System. [7] Finin, Tim, James Mayfield, Chelliah Thirunavukkarasu. 1995. Secret Agents – A security Architecture for the KAML Agent Communication Language. CIKM’95 Intelligent Information Agents Workshop. Baltimore, December 1995. [8] He, Qi, Katia P. Sycara, and Timothy W. Finin. 1998. Personal Security Agent: KQML-Based PKI. Proceedings of the Second International Conference on Autonomous Agents. [9] Hu, Yuh-Jong. 2003. Trusted Agent-Mediated E-Commerce Transaction Services via Digital Certificate Management, Electronic Commerce Research, Vol. 3, Issues 3-4, July-October.2003. [10] Hu, Yuh-Jong. 2001. Some Thoughts on Agent Trust and Delegation. The Fifth International Conference on Autonomous Agents. May 28 – June 1, 2001. Montreal, Canada. [11] Jennings, N., Sycara, K. and Wooldridge, M., 1998, A Roadmap of Agent Research and Development, Journal of Autonomous Agents and Multi-Agent Systems. [12] Klusch, M. and Sycara, K., Brokering and Matchmaking for Coordination of Agent Societies: A Survey. Coordination of Internet Agents. Springer, 2001. [13] Lamsal, Pradip., 2001, Understanding Trust and Security. citeseer.nj.nec.com/lamsal01understanding.html, 2001 [14] Lloyd, S., PKI Forum, 2002, White paper: Understanding Certification Path Construction. PKI Forum’s Technical Group(TWG), 2002. [15] Maurer, Ueli., 1996, Modeling a Public-Key Infrastructure. European Symposium on Research in Computer Security(ESORICS’96). [16] Perlman, R., Sun Microsystems, 1999, An Overview of PKI Trust Models. IEEE Network November/December 1999. [17] PKCS (Public Key Crypto System), RSA Laboratories. http://www.rsa.com/rsalabs/pubs/PKCS/ [18] PKI white paper, http://www.pkiforum.com [19] Polk, W. Timothy et al.. 1996. Public Key Infrastructure: From Theory to Implementation. http://csrc.ncsl.nist.gov/pki/panel/overview.html. NIST. [20] Public-Key Infrastructure (X.509) (pkix), http://www.ietf.org/html.charters/pkix-charter.html [21] Rivest, R. and Bulter Lampson. SDSI – A Simple Distributed Security Infrastructure. http://theory.lcs.mit.edu/cis/sdsi.html [22] Smith, Sean and Marchesini, John. 2002. Virtual Hierarchies-An Architecture for Building and Maintaining Efficient and Resilient Trust Chains. www.dartmouth.edu/~pkilab/slides/NORDSEC6Nov02.pdf , Nov. 2002. [23] UDDI White paper, http://www.uddi.org/whitepapers.html [24] Wong, H. Chi and Katia Sycara. 1999. Adding Security and Trust to Multi-Agent Systems. Proceedings of Autonomous Agents ’99 ( Workshop on Deception, Fraud and Trust in Agent Societies), May 1999, Seattle, Washington. [25] Zimmermann, R. Philip. 1995.The Official PGP User’s Guide , MIT press |
Description: | 碩士 國立政治大學 資訊科學學系 90753017 92 |
Source URI: | http://thesis.lib.nccu.edu.tw/record/#G0090753017 |
Data Type: | thesis |
Appears in Collections: | [資訊科學系] 學位論文
|
All items in 政大典藏 are protected by copyright, with all rights reserved.
|