{"title":"基于移动代理的虚拟企业交互认证设计","authors":"Ya-ling Zhang, Jian Bai","doi":"10.1109/IEEC.2010.5533294","DOIUrl":null,"url":null,"abstract":"Aiming at the problem on lack of independence and interoperability between Virtual Enterprise members in the process of interactive authentication, a virtual certificate authority model is constructed based on the (t ,n) threshold theory and mobile agent technology. Using of the autonomy, heterogeneity, dynamic, mobility and interoperability of the agent technology, several protocols of VCA are designed, such as creation protocol of the VCA, issuance protocol of member certificates and authentication protocol of members, etc. By testing, the system can meet the needs of threshold interactive authentication. The interactive authentication between member enterprises can be implemented.","PeriodicalId":307678,"journal":{"name":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"The Design of Interactive Authentication for Virtual Enterprise Based on Mobile Agent\",\"authors\":\"Ya-ling Zhang, Jian Bai\",\"doi\":\"10.1109/IEEC.2010.5533294\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Aiming at the problem on lack of independence and interoperability between Virtual Enterprise members in the process of interactive authentication, a virtual certificate authority model is constructed based on the (t ,n) threshold theory and mobile agent technology. Using of the autonomy, heterogeneity, dynamic, mobility and interoperability of the agent technology, several protocols of VCA are designed, such as creation protocol of the VCA, issuance protocol of member certificates and authentication protocol of members, etc. By testing, the system can meet the needs of threshold interactive authentication. The interactive authentication between member enterprises can be implemented.\",\"PeriodicalId\":307678,\"journal\":{\"name\":\"2010 2nd International Symposium on Information Engineering and Electronic Commerce\",\"volume\":\"40 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-07-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 2nd International Symposium on Information Engineering and Electronic Commerce\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IEEC.2010.5533294\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 2nd International Symposium on Information Engineering and Electronic Commerce","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IEEC.2010.5533294","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The Design of Interactive Authentication for Virtual Enterprise Based on Mobile Agent
Aiming at the problem on lack of independence and interoperability between Virtual Enterprise members in the process of interactive authentication, a virtual certificate authority model is constructed based on the (t ,n) threshold theory and mobile agent technology. Using of the autonomy, heterogeneity, dynamic, mobility and interoperability of the agent technology, several protocols of VCA are designed, such as creation protocol of the VCA, issuance protocol of member certificates and authentication protocol of members, etc. By testing, the system can meet the needs of threshold interactive authentication. The interactive authentication between member enterprises can be implemented.