By Topic

The authentication and identity delegation about mobile agent system based on trusted computing platform

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Zhidong Shen ; International School of Software, State Key Laboratory of Software Engineering, Wuhan University, China, 430079 ; Xiaoping Wu

In the mobile agent system, the authentication and identity delegation of mobile agents are the important security problem. This paper focuses on the issues faced by a relying party when deciding to trust a CA and the certificates that it issues. The scope of this paper is limited to examining the basis for trusting a relying party places in an identity certificate signed by a CA. Some of the working group's discussion of the authentication and delegation of identity of mobile agent are also presented. This paper also gives a way to protect private keys and identity certificates in the mobile agent environment. The mobile agent and agent platform can use these certificates to build trust relationships between the CA and its registration authorities, or trust relationships between the end entities and the service providers.

Published in:

Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on  (Volume:2 )

Date of Conference:

9-11 July 2010