Zhi-Dong Shen

Learn More
Mobile agent, as a promising distributed computing technology, can be used in many fields. The security problem of mobile agent is important for applications based on mobile agent technology. In this paper, we proposed a trust management model for mobile agent system to improve the security of the mobile agent system. In this model, the security of mobile(More)
Grid provides people the way to share large mount of distributed resources and services that belong to different local organizations. That is a good way to share many kinds of distributed resources via the network in the open environment, thus it makes security problems more complicate and more important for us than before. In this paper, we analyze the(More)
A critical problem for grid security is how to gain secure solution for Grid virtual organization (VO). In Grid practice at present, issues of VO security rely on non-distributed policy management and related PKI mechanism. A practical but difficult solution is to enforce fine granularity policy over distributed sites. The emerging Trusted Computing (TC)(More)
The Mobile Agent (MA) has been seen as a promising distributed computing technology. According to the analysis of security problems of current mobile agents that are exposed in opening environment, a model system for mobile agent is proposed in this paper. In this system, the mobile agent security is enhanced by the Trusted Computing Technology. The mobile(More)
As an important new paradigm for distributed computing, the mobile agent (MA) technology has a lot of potential applications in practical fields. However, the success of MA depends on its security. The common important problem of all existing security solutions in MA system is secure key management. This paper presented the key management tree architecture(More)
Grid manages resources and services distributed across multiple control domains. Grid computing provides people the way to share large mount of distributed resources and services that belong to different local domain. It also makes security problems more complicate, such as in the grid group communication. In this paper, we analyze security requirements of(More)
  • 1