首页 | 官方网站   微博 | 高级检索  
     

移动代码加密理论研究
引用本文:黄少寅,尹长青,高传善.移动代码加密理论研究[J].计算机研究与发展,2003,40(11):1626-1634.
作者姓名:黄少寅  尹长青  高传善
作者单位:复旦大学计算机科学与工程系,上海,200433
摘    要:“如何保护移动代码不受结点主机的篡改”是移动智能体及主动网安全机制的研究难点,传统采用防篡改硬件保护法而对基于密码学的纯软件保护法研究很少.介绍了该类方法的研究现状并着重阐述了移动代码加密理论的产生背景、盲计算理论基础、与传统加密理论差异及该理论目前所存在的问题,提出了面向对象的加密理论概念,指出其未来的研究方向及潜在的应用领域.

关 键 词:移动智能体  主动网  移动代码加密  防篡改硬件  面向对象加密  盲计算

A Survey of Mobile Code Cryptography Research
HUANG Shao-Yin,YIN Chang-Qing,and GAO Chuan-Shan.A Survey of Mobile Code Cryptography Research[J].Journal of Computer Research and Development,2003,40(11):1626-1634.
Authors:HUANG Shao-Yin  YIN Chang-Qing  and GAO Chuan-Shan
Abstract:How to protect mobile code against the tampering attempts by the malicious host is the key issue in the security of mobile agent and active networks. Recent works focus on how to utilize the resistant-hardware to protect mobile code against attack of remote malicious hosts. However, few researches are involved in designing pure-software approaches to protect mobile code against tampering. In this paper, the current pure-software solutions for the security of mobile agent are introduced and then a survey is given to the popular method: MCC (mobile code cryptography), which can accomplish what is called blind computation of functions. The background and theory basis of MCC is introduced, and it is indicated that MCC is very different from traditional data cryptography. In addition, a novel concept, object oriented cryptography (OOC), is proposed and the direction of MCC research and its potential application area are pointed out.
Keywords:mobile agent  active network  mobile code cryptography (MCC)  tamper resistant hardware  object oriented cryptography (OOC)  blind computingx
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号