Efficient Date-constraint Access Control and Key Management Scheme for Mobile Agents release_yizocscloza55i4algrntyapsm

by Yu-Fang Chung, Ming-Hsien Kao, Tzer-Long Chen, Tzer-Shyong Chen

Entity Metadata (schema)

abstracts[] {'sha1': '1ffe7a5051d59b1a744b526695eb4acd95a70bc6', 'content': "A mobile agent has become a competent software nowadays because of its significant abilities. It can roam freely in different Internet environments, adapt itself to various types of online servers totally associated to the characteristics of said server, and detect its environment and automatic adaptation to the environment while executing the assigned tasks by users. Due to these competencies, mobile agents have been widely used in Internet business, wireless communications, information security technologies and so forth. In 1983, Akl and Taylor suggested the concept of super-key to resolve the key management issues. It's the kind of thing where a mobile agent faces. Thus in 1998, Volker and Mehrdad proposed a tree-based mobile agent model to deal with the access control problem. The proposed scheme is based upon Elliptic Curve Cryptosystem (ECC), which enhances the operational ability of a mobile agent because of shorter key length and higher efficiency on encryption and decryption processes. For a mobile agent, a said user will be forced to log out of the system due to error or change in the user's rights or after a period of time. As is the case, the system must keep modifying the original access rights of the key so as to prevent a user from continuing to use his old key. However, this action could cause unnecessary error and risks, in addition to the large amount of computations that the system needs to perform. Hence, this paper proposes a Date-constraint key management scheme, where a date is attached to a key, so as to give its validity period of the key. Thus, key management can be more efficient.", 'mimetype': 'text/plain', 'lang': None}
container
container_id
contribs[] {'index': 0, 'creator_id': None, 'creator': None, 'raw_name': 'Yu-Fang Chung', 'given_name': None, 'surname': None, 'role': 'author', 'raw_affiliation': None, 'extra': None}
{'index': 1, 'creator_id': None, 'creator': None, 'raw_name': 'Ming-Hsien Kao', 'given_name': None, 'surname': None, 'role': 'author', 'raw_affiliation': None, 'extra': None}
{'index': 2, 'creator_id': None, 'creator': None, 'raw_name': 'Tzer-Long Chen', 'given_name': None, 'surname': None, 'role': 'author', 'raw_affiliation': None, 'extra': None}
{'index': 3, 'creator_id': None, 'creator': None, 'raw_name': 'Tzer-Shyong Chen', 'given_name': None, 'surname': None, 'role': 'author', 'raw_affiliation': None, 'extra': None}
ext_ids {'doi': None, 'wikidata_qid': None, 'isbn13': None, 'pmid': None, 'pmcid': None, 'core': None, 'arxiv': None, 'jstor': None, 'ark': None, 'mag': None, 'doaj': None, 'dblp': None, 'oai': None, 'hdl': None}
files[] {'state': 'active', 'ident': 'qjrru6aszfe6xerptos2jujkxe', 'revision': '7f493b4e-f2e2-48fc-bf15-8418d8a03866', 'redirect': None, 'extra': None, 'edit_extra': None, 'size': 661220, 'md5': 'f7dc0ab56a44c8b3baa064fbb45b2ea0', 'sha1': 'fc640871c1ebce9ec60c9fef279daab21ced2aa5', 'sha256': '99e6b3dc7cc7bc69008d82a419cbc1f4045aceb93161e473db389fcd5b7e442b', 'urls': [{'url': 'https://web.archive.org/web/20180430114535/http://www.iaeng.org/publication/IMECS2010/IMECS2010_pp252-257.pdf', 'rel': 'webarchive'}, {'url': 'http://www.iaeng.org/publication/IMECS2010/IMECS2010_pp252-257.pdf', 'rel': 'web'}], 'mimetype': 'application/pdf', 'content_scope': None, 'release_ids': ['yizocscloza55i4algrntyapsm'], 'releases': None}
filesets []
issue
language
license_slug
number
original_title
pages
publisher
refs[] {'index': 0, 'target_release_id': None, 'extra': {'authors': ['S Akl', 'P Taylor'], 'volume': None}, 'key': 'b0', 'year': 1983, 'container_name': None, 'title': 'Cryptographic Solution to a Problem of Access Control in a Hierarchy', 'locator': None}
{'index': 1, 'target_release_id': None, 'extra': {'authors': ['R Volker', 'J Mehrdad'], 'volume': '22'}, 'key': 'b1', 'year': 1998, 'container_name': None, 'title': 'Access Control and Key Management for Mobile Agents', 'locator': None}
{'index': 2, 'target_release_id': None, 'extra': {'authors': ['A Karmouch'], 'issue': None, 'volume': '36'}, 'key': 'b2', 'year': 1998, 'container_name': None, 'title': 'Mobile Software Agents for Telecommunications', 'locator': None}
{'index': 3, 'target_release_id': None, 'extra': {'authors': ['I Lin', 'H Ou', 'M Hwang'], 'issue': None, 'volume': '26'}, 'key': 'b3', 'year': 2004, 'container_name': None, 'title': 'Efficient Access Control and Key Management Schemes for Mobile Agents', 'locator': None}
{'index': 4, 'target_release_id': None, 'extra': {'authors': ['F Hohl']}, 'key': 'b4', 'year': 1998, 'container_name': None, 'title': 'A Model of Attacks Malicious Hosts Against Mobile Agents', 'locator': None}
{'index': 5, 'target_release_id': None, 'extra': {'authors': ['D Lange', 'M Oshima']}, 'key': 'b5', 'year': 1998, 'container_name': None, 'title': 'Programming and Deploying Java Mobile Agents with Aglets', 'locator': None}
{'index': 6, 'target_release_id': None, 'extra': {'authors': ['N Koblitz'], 'issue': '177', 'volume': '48'}, 'key': 'b6', 'year': 1987, 'container_name': None, 'title': 'Elliptic Curve Cryptosystems', 'locator': None}
{'index': 7, 'target_release_id': None, 'extra': {'authors': ['V Miller'], 'volume': '218'}, 'key': 'b7', 'year': 1986, 'container_name': None, 'title': 'Use of Elliptic Curves in Cryptography', 'locator': None}
{'index': 8, 'target_release_id': None, 'extra': {'authors': ['S Wu']}, 'key': 'b8', 'year': 2005, 'container_name': None, 'title': 'Authentication and Group Secure Communications Using Elliptic Curve Cryptography', 'locator': None}
{'index': 9, 'target_release_id': None, 'extra': {'authors': ['Y Chung', 'H Lee', 'F Lai', 'T Chen'], 'issue': None, 'volume': '178'}, 'key': 'b9', 'year': 2008, 'container_name': None, 'title': 'Access Control in User Hierarchy Based on Elliptic Curve Cryptosystem', 'locator': None}
{'index': 10, 'target_release_id': None, 'extra': {'authors': ['C Shieh']}, 'key': 'b10', 'year': 2006, 'container_name': None, 'title': 'An Efficient Design of Elliptic Curve Cryptography Processor', 'locator': None}
{'index': 11, 'target_release_id': None, 'extra': {'authors': ['K Huang', 'Y Chung', 'C Liu', 'F Lai', 'T Chen']}, 'key': 'b11', 'year': 2007, 'container_name': None, 'title': 'Efficient Migration for Mobile Computing in Distributed Networks', 'locator': None}
{'index': 12, 'target_release_id': None, 'extra': {'authors': ['D Guan', 'L Jen'], 'volume': None}, 'key': 'b12', 'year': 2005, 'container_name': None, 'title': 'Study and Implementation of Elliptic Curve Cryptosystem', 'locator': None}
release_date
release_stage
release_type article-journal
release_year
subtitle
title Efficient Date-constraint Access Control and Key Management Scheme for Mobile Agents
version
volume
webcaptures []
withdrawn_date
withdrawn_status
withdrawn_year
work_id minhw3zmeraz3gvlyrvhwkpg4i
As JSON via API

Extra Metadata (raw JSON)

longtail_oa True