Novel mobile agent dynamic data integrity protection protocol

Integrity characteristics of dynamic data was redefined and classified by attacker capability,and then it was analyzed how to protect truncation attack with collusion.After that,a data protection protocol of free-roaming agent was presented.The protocol used a reverse chained signature to protect th...

Full description

Saved in:
Bibliographic Details
Main Authors: LI Peng-fei1, QING Si-han2, MA Heng-tai1, DENG Yong1
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2007-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74658864/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537484199034880
author LI Peng-fei1
QING Si-han2
MA Heng-tai1
DENG Yong1
author_facet LI Peng-fei1
QING Si-han2
MA Heng-tai1
DENG Yong1
author_sort LI Peng-fei1
collection DOAJ
description Integrity characteristics of dynamic data was redefined and classified by attacker capability,and then it was analyzed how to protect truncation attack with collusion.After that,a data protection protocol of free-roaming agent was presented.The protocol used a reverse chained signature to protect the integrity of roaming path,and protected the dy-namic data integrity based on this.Specially,the protocol provided truncation resilience in collusion condition,and its secure property was proved by formal method.
format Article
id doaj-art-b48db1171e984ef2b20fb01f243e9618
institution Kabale University
issn 1000-436X
language zho
publishDate 2007-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-b48db1171e984ef2b20fb01f243e96182025-01-14T08:34:43ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2007-01-0111074658864Novel mobile agent dynamic data integrity protection protocolLI Peng-fei1QING Si-han2MA Heng-tai1DENG Yong1Integrity characteristics of dynamic data was redefined and classified by attacker capability,and then it was analyzed how to protect truncation attack with collusion.After that,a data protection protocol of free-roaming agent was presented.The protocol used a reverse chained signature to protect the integrity of roaming path,and protected the dy-namic data integrity based on this.Specially,the protocol provided truncation resilience in collusion condition,and its secure property was proved by formal method.http://www.joconline.com.cn/zh/article/74658864/mobile agentsfree-roamingtruncation resiliencedata integrity
spellingShingle LI Peng-fei1
QING Si-han2
MA Heng-tai1
DENG Yong1
Novel mobile agent dynamic data integrity protection protocol
Tongxin xuebao
mobile agents
free-roaming
truncation resilience
data integrity
title Novel mobile agent dynamic data integrity protection protocol
title_full Novel mobile agent dynamic data integrity protection protocol
title_fullStr Novel mobile agent dynamic data integrity protection protocol
title_full_unstemmed Novel mobile agent dynamic data integrity protection protocol
title_short Novel mobile agent dynamic data integrity protection protocol
title_sort novel mobile agent dynamic data integrity protection protocol
topic mobile agents
free-roaming
truncation resilience
data integrity
url http://www.joconline.com.cn/zh/article/74658864/
work_keys_str_mv AT lipengfei1 novelmobileagentdynamicdataintegrityprotectionprotocol
AT qingsihan2 novelmobileagentdynamicdataintegrityprotectionprotocol
AT mahengtai1 novelmobileagentdynamicdataintegrityprotectionprotocol
AT dengyong1 novelmobileagentdynamicdataintegrityprotectionprotocol