Abstract
Security issues are key factors for the deployment and acceptance of agent based systems in the telecommunication area. This fact is most obvious in electronic commerce applications, where security services have to be offered. These services are needed to ensure secure communication, fair exchange of goods and payment. Public key cryptography techniques are an often employed mechanism. Keys are distributed by using a certificate to store them and to provably associate them to a principal. This document deals with the design of an agent-based certificate authority (CA) and key distribution center (KDC).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Sahin Albayrak and Dirk Wieczorek. Jiac — an open and scalable agent architecture for telecommunication applications. In H. Velthuijsen and S. Albayrak, editors, Intelligent Agents in Telecommunications Applications — Basics, Tools, Languages and Applications. IOS Press, Van Diemenstraat 94, 1013 CN Amsterdam, The Netherlands, January 1997. ISBN 90 5199 295 5.
Alfred Arsenault and Sean Turner. Internet X.509 Public Key Infrastructure PKIX Roadmap. Located at http://www.ietf.org/internet-drafts/draft-ietf-pkixroadmap-00.txt, September 1998. PKIX Working Group. Internet Draft.
Graham Hamilton (Editor). JavaBeansTM Version 1.01, July 1997.
Tim Finin and Jay Weber et al. Draft specification of the KQML agent comminication language. Located at http://www.cs.umbc.edu/kqml/kqmlspec/spec.html, June 15 1993.
FIPA. FIPA 98 Specification Part No.10, Version 1.0 Agent Security Management. Located at http://www.fipa.org, October 1998. FIPA-Foundation for Intelligent Physical Agents.
Alan O. Freier, Philip Karlton, and Pail C. Kocher. The SSL Protocol Version 3.0. Located at http://home.netscape.com/eng/ssl3/index.html, March 1996.
Li Gong. Implementing Protection Domains in the Java Development Kit™ 1.2. In Proceedings of the Internet Society Symposium on Network and Distributed System Security, pages 125–134, San Diego, California, March 1998.
Li Gong. Secure Java Class Loading. IEEE Internet Computing, 2(6):56–61, November/December 1998.
Li Gong, Marianne Mueller, Hemma Prafullchandra, and Roland Schemers. Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit™ 1.2. In Proceedings of the USENIX Symposium on Internet Technologies and Systems, pages 102–112, Monterey, California, December 1997.
James Gosling, Bill Joy, and Guy Steele. The Java Language Specification. Located at http://java.sun.com/docs/books/jls/html/index.html, 1996. Sun Microsystems, Inc.
IAIK-JCE. Located at http://jcewww.iaik.tu-graz.ac.at/. IAIK Java Security, Institute for Applied Information Processing and Communications, Graz University of Technology.
ITU-T. Recommentation X.509: The Directory-Authentication Framework, June 1997.
Javaâ„¢ Cryptography Architecture API Specification & Reference. Located at http://java.sun.com/products/jdk/1.2/docs/guide/security/CryptoSpec.html, October 1998. Sun Microsystems, Inc.
Javaâ„¢ Cryptography Extension 1.2-API Specification & Reference. Located at http://java.sun.com/products/jce/. Sun Microsystems, Inc.
Steve Kent. RFC 1422 Privacy Enhancement for Internet Electronic Mail: Part II: Certificate-based Key Management, February 1993.
RSA Laboratories. PKCS#10: Certificate Request Syntax Standard. Located at http://www.rsa.com/rsalabs/pubs/PKCS/, November 1993.
Sheng Liang and Gilad Bracha. Dynamic Class Loading in the Java Virtual Machine. To appear in the 13th Annual ACM SIGPLAN Conference on Object-Oriented Programming Systems, Languages, and Applications OOPSLA’98, October 1998. ACM.
Tim Lindholm and Frank Yellin. The JavaTM Virtual Machine Specification. Located at http://java.sun.com/docs/books/vmspec/html/VMSpecTOC.doc.html, September 1996. Sun Microsystems, Inc.
Bruce Schneier. Applied Cryptography. Joh Wiley & Sons, Inc, 2nd edition, 1996.
TeleSec. Analyse einer TTP-Message. Located at http://www.telesec.de, Dezember 1998. Deutsche Telekom AG.
Chelliah Thirunavukkarasu, Tim Finin, and James Mayfield. Secret Agents — A Security Architecture for the KQML Agent Communication Language. Draft submitted to the CIKM’95 Intelligent Information Agents Workshop, October 1995.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bsufka, K., Holst, S., Schmidt, T. (1999). Realization of an Agent-Based Certificate Authority and Key Distribution Center. In: Albayrak, S. (eds) Intelligent Agents for Telecommunication Applications. IATA 1999. Lecture Notes in Computer Science(), vol 1699. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48165-6_8
Download citation
DOI: https://doi.org/10.1007/3-540-48165-6_8
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-66539-7
Online ISBN: 978-3-540-48165-2
eBook Packages: Springer Book Archive