Along with the development of Internet, the resources become fruitful rich, theperformance and the reliability of network connection become unstable. Obviously,RPC technology, based on LAN, lacks of individuality, flexibility, and is unsuitableunder this condition. Therefore, a more advanced computation mode is needed fornetwork computation of Internet. Mobile Agent technology emerges under thisbackground.A mobile agent can migrate independently and can move individualitycomputation to the server where resources exist, it has following advantages: open,flexibility, robustness, scalability, efficiency, and supporting mobile customer.However, because mobile agent system supports mobile agents to migrateindependently, mobile agents are facing serious security threat. If this problem can'tbe solved, it will be impossible to apply this technology in those areas that needsecurity.On the basis of Vigna's Reference State Protocol, this dissertation addresses toestablish a security protocol-TRIP (Tracing Results and Inputs Protocol), whichtracing a mobile agent's results and inputs, to solve various kinds of problems that amobile agent may be met while running in malicious environment. The solution usestransitive digital signature technology to hide and verify a mobile agent's route.Furthermore, this dissertation proposes a security solution for mobile agents to signdigital signature in malicious hosts using CEF (Computing with Encrypted Function)technology. The solution can prevent a malicious host to spy on agent's private dataand abuse the digital signature. |