{"title":"The Design of Interactive Authentication for Virtual Enterprise Based on Mobile Agent","authors":"Ya-ling Zhang, Jian Bai","doi":"10.1109/IEEC.2010.5533294","DOIUrl":null,"url":null,"abstract":"Aiming at the problem on lack of independence and interoperability between Virtual Enterprise members in the process of interactive authentication, a virtual certificate authority model is constructed based on the (t ,n) threshold theory and mobile agent technology. Using of the autonomy, heterogeneity, dynamic, mobility and interoperability of the agent technology, several protocols of VCA are designed, such as creation protocol of the VCA, issuance protocol of member certificates and authentication protocol of members, etc. By testing, the system can meet the needs of threshold interactive authentication. The interactive authentication between member enterprises can be implemented.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IEEC.2010.5533294","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Aiming at the problem on lack of independence and interoperability between Virtual Enterprise members in the process of interactive authentication, a virtual certificate authority model is constructed based on the (t ,n) threshold theory and mobile agent technology. Using of the autonomy, heterogeneity, dynamic, mobility and interoperability of the agent technology, several protocols of VCA are designed, such as creation protocol of the VCA, issuance protocol of member certificates and authentication protocol of members, etc. By testing, the system can meet the needs of threshold interactive authentication. The interactive authentication between member enterprises can be implemented.