Font Size: a A A

Research And Implementation Of Agent-Based Key Management

Posted on:2007-10-06Degree:MasterType:Thesis
Country:ChinaCandidate:J H LuoFull Text:PDF
GTID:2178360185973853Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of the network communication, there have been more and more requirements for information security. But key management is one of the key to improve the information security. The traditional technology of key management can no longer satisfy with people's demands. At the same time, Agent technology has one of the front research directions of Computer Science especially in Artificial Intelligence field in recent years, it has a high application-value in parallel programming, computer communication, network management and control. After research key management technology and Agent technology, I present an assumption, which is about the utilization of Agent technology on the establishing an key management system. What's more, there are the detailed design project and realization method in the thesis. The superiority of the dynamic infrastructure by which communication and cooperation among agents are created is obvious compared with the traditional static one. The keys have more security and applicability in this system. It achieves the aim of key management, which needs not participative management. And it also reaches the request of security and integrality in the course of key transmission. Here are the main contents of this thesis:Firstly, the thesis brief accounts of the background environment, which exists the risk of information security, and analyzes the need for the establishment of key management systems.Secondly, it introduces the basic theory of key management technology and Agent technology, including key management issues involved factors, content, key classification management, Ontology and Agent communication language (KQML). Then, it researches the current status of them, and analyzes the shortcoming of the traditional technology of key management.Thirdly, the basis of the above findings, it presents an assumption which is the based-agent key management system, combining with the technical characteristics of Agent, and describes system management models and network communication models, as well as the workflow of key management system. I elaborate the relevant technical achievement of the based-agent key management system, including Agent coordination, Agent Script-Protocol language, as well as the realization of key create, storage, distribution, updating, renew and abolishment in detail. Then it analyzes the security of the key management system and makes other necessary protective measures.Finally, it gives the realization of the applications process, including system design principles, system framework, system modules and the system application results. It accomplishes basically the Agent-Based key management system.
Keywords/Search Tags:Key management, Agent, Credit alliance, Information security
PDF Full Text Request
Related items