Please use this identifier to cite or link to this item: https://ah.lib.nccu.edu.tw/handle/140.119/85506
題名: 一個以代理人為基礎具有分散式認證授權服務的安全性電子交易環境
An Agent-Based Secure E-Commerce Environment with Distributed Authentication and Authorization Services
作者: 李英宗
Lee, Ing-Chung
貢獻者: 胡毓忠
Hu, Yu-Jong
李英宗
Lee, Ing-Chung
關鍵詞: 代理人
agent
日期: 2001
上傳時間: 18-Apr-2016
摘要: 本研究計畫的主題在於研究代理人的可信度管理,首要的目標是建立一個以代理人為基礎的安全式電子交易環境。以目前的情況來看,唯有代理人的觀念及技術來執行電子商務仲介者的角色,利用軟體代理者具有自主性,及適時反應等特質,提供服務時的效益和彈性,再輔以適當的安全性管理及深入的可信度探討,電子商務才可能被具體應用到人類實際日常生活上。在作法上除了採用FIPA的規格作為代理人系統平台的實作標準,延伸XML/RDF來便利代理人的建構與溝通,更進一步結合X.509及SPKI/SDSI兩種類型憑證的優點,導入分散式認證授權的觀念,並透過RBAC的控管,形成多重代理人系統的安全架構。配合相關的信任策略及商務模型,以期完成建構一個以代理人為基礎可信任安全式電子交易環境的目標。
This thesis describes an agent-based secure E-Commerce environment with distributed authentication and authorization services. The previous researches about security issues in agent-mediated E-commerce do not solve the problems of deals with strangers. We merge role based access control (RBAC) concept for adapting the certificates to different business models or new content-based network. Several types of agent delegation mechanism based on our role certificates and some considerations about how to achieve agent trust management with policies both in logics and practice are presented. Finally, We will demonstrate a scenario on FIPA OS system by using agent communication language (ACL) and content language (CL) encoded by XML and XML/RDF.
封面頁\r\n證明書\r\n論文摘要\r\n致謝詞\r\n目錄\r\n圖目錄\r\n表目錄\r\n1 Introduction\r\n1.1 Overview\r\n1.2 Related Work\r\n1.3 Contribution\r\n1.4 Organization\r\n2 Preliminary\r\n2.1 Overview\r\n2.2 Terms\r\n3 Our approach\r\n3.1 Overview\r\n3.2 Agent-Based Secure E-Commerce Environment\r\n3.2.1 Secure E-Commerce Environment without CA\r\n3.2.2 Agent Platform\r\n3.3 Access Control System\r\n3.3.1 Role-based Access Control\r\n3.3.2 Role Certificate Authentication\r\n3.4 Authorization Policy and Delegation Logics\r\n3.4.1 Symbol Representation\r\n3.4.2 Certificate Deduction\r\n3.4.3 Certificate Delegation Network\r\n3.5 Agent Communication Language\r\n3.5.1 Certificate Management Operations\r\n3.5.2 Certificate Encoding in XML/RDF\r\n4 Implementation\r\n4.1 Implementation Environment\r\n4.1.1 Java\r\n4.1.2 FIPA Request Interaction Protocol\r\n4.2 System implementation\r\n4.2.1 system overview\r\n4.2.2 agent implementation\r\n4.3 Scenario\r\n4.3.1 Implementation of Provider Agent\r\n4.3.2 Implementation of Demander Agent\r\n4.3.3 Implementation of Matcher Agent\r\n5 Conclusions\r\nReferences
參考文獻: [1] Abadi, M., Burrows, M., and Lampson, B. (1993). A Calculus for Access Control in Distributed Systems. ACM Transactions on Programming Languages and Systems, 15(4), 706-734.\r\n[2] Aura, T. (1998). On the Structure of Delegation Network. Proceedings of the 11th IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, 14-26.\r\n[3] Aura, T. (1999). Distributed Access-Rights Management with Delegation Certificates. Secure Internet Programming: Security Issues for Mobile and Distributed Objects LNCS 1603, Springer-Verlag, 213-238.\r\n[4] Blaze, M., Feigenbaum, J., and Lacy, J. (1996). Decentralized Trust Management. Proceedings of the 17th Symposium on Security and Privacy, 164-173.\r\n[5] Camp, L.J. (2000). Trust and Risk in Internet Commerce, MIT Press.\r\n[6] Chu, Y.H., Feigenbaum, J., LaMacchia, B., Resnick, P., and Strauss, M. (1997). REFEREE: Trust Management for Web Applications. World Wide Web Journal, 2, 127-139.\r\n[7] Ellison, M. Carl, et al. (1999). SPKI Certificate Theory, RFC 2693, Internet Society. See ftp://ftp.isi.edu/in-notes/rfc2693.txt\r\n[8] Extensible Markup Language (XML). See http://www.w3.org/XML/\r\n[9] FIPA Specification Repository. See http://www.fipa.org/repository/index.html\r\n[10] Gerck, E. (1998). Overview of Certification systems. See http://www.mcg.org.br\r\n[11] He, Q., Sycara, K., and Finin, T.W. (1998). Personal Security Agent: KQML-Based PKI, ACM Conference on Autonomous Agents.\r\n[12] Herzbery, A., Mass, Y., Mihaeli, J., Naor, D., and Ravid, Y. (2000). Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers, 2000 IEEE Symposium on Security and Privacy, 2-14.\r\n[13] Hu, Y.J. (2001). Some Thoughts on Agent Trust and Delegation. Proceedings of The 5th International Conference on Autonomous Agents 2001.\r\n[14] JDOM. See http://www.jdom.org/\r\n[15] Jennings, R.N., Sycara, K., and Wooldridge M. (1998). A Roadmap of Agent Research and Development. Journal of Autonomous Agents and Multi-Agent Systems, 1(1), 7-38.\r\n[16] Kimbrough, O.S. and Moore, A.S. (1997). On Automated Message Processing in Electronic Commerce and Work Support Systems: Speech Act Theory and Expressive Felicity, ACM Transactions on Information Systems, 15(4), 321-367.\r\n[17] NIST Role Based Access Control. See http://hissa.nist.gov/rbac/\r\n[18] Nortel Networks FIPA-OS. See http://sourceforge.net/projects/fipa-os/\r\n[19] Nwana, S.H., et al. (1998). Agent-Mediated Electronic Commerce: Issues, Challenges and some Viewpoints. Proceedings of the 2nd International Conference on Autonomous Agent 98, 189-196.\r\n[20] Resource Description Framework (RDF). See http://www.w3.org/RDF/\r\n[21] Rivest, R., and Lampson, B., SDSI: A Simple Distributed Security Infrastructure (SDSI). See http://theory.lcs.mit.edu/~cis/sdsi.html\r\n[22] Special Interest Group on Agent-Mediated Electronic Commerce. See http://www.iiia.csic.es/AMEC/\r\n[23] Wong, H. C., and Sycara, K. (1999). Adding Security and Trust to Multi-Agent Systems. Proceedings of Autonomous Agents ’99 (Workshop on Deception, Fraud and Trust in Agent Societies). 149-161.\r\n[24] XML-Signature WG. See http://www.w3.org/Signature/
描述: 碩士
國立政治大學
資訊科學學系
資料來源: http://thesis.lib.nccu.edu.tw/record/#A2002001572
資料類型: thesis
Appears in Collections:學位論文

Files in This Item:
File SizeFormat
index.html1.04 kBHTML2View/Open
Show full item record

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.