{"title":"基于移动代理的电子服务框架的两层加密方案","authors":"Tzone-I Wang, K. Tsai, Ming-Che Lee","doi":"10.1080/02533839.2005.9671033","DOIUrl":null,"url":null,"abstract":"We present an e-service framework, designed in allusion to the service-on-demand concept, for the next generation service-based Internet applications. A two-layer cryptographic security infrastructure is laid in the e-service framework for secured services. By separating the service functionality from its operating medium, the framework successfully prevents many security hazards from happening. It also offers a most desirable benefit to both service providers and users. For service providers, deployment of a service is as easy as inserting a plug-n-play interface card and for service users, using a service is as easy as filling out a downloaded form. The main goal of this framework is to offer a total solution for providing and using secured services easily instead of programming for services hardly.","PeriodicalId":360167,"journal":{"name":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","volume":"70 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A two-layer cryptographic scheme for an e-service framework based on mobile agents\",\"authors\":\"Tzone-I Wang, K. Tsai, Ming-Che Lee\",\"doi\":\"10.1080/02533839.2005.9671033\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We present an e-service framework, designed in allusion to the service-on-demand concept, for the next generation service-based Internet applications. A two-layer cryptographic security infrastructure is laid in the e-service framework for secured services. By separating the service functionality from its operating medium, the framework successfully prevents many security hazards from happening. It also offers a most desirable benefit to both service providers and users. For service providers, deployment of a service is as easy as inserting a plug-n-play interface card and for service users, using a service is as easy as filling out a downloaded form. The main goal of this framework is to offer a total solution for providing and using secured services easily instead of programming for services hardly.\",\"PeriodicalId\":360167,\"journal\":{\"name\":\"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004\",\"volume\":\"70 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2004-03-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1080/02533839.2005.9671033\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/02533839.2005.9671033","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A two-layer cryptographic scheme for an e-service framework based on mobile agents
We present an e-service framework, designed in allusion to the service-on-demand concept, for the next generation service-based Internet applications. A two-layer cryptographic security infrastructure is laid in the e-service framework for secured services. By separating the service functionality from its operating medium, the framework successfully prevents many security hazards from happening. It also offers a most desirable benefit to both service providers and users. For service providers, deployment of a service is as easy as inserting a plug-n-play interface card and for service users, using a service is as easy as filling out a downloaded form. The main goal of this framework is to offer a total solution for providing and using secured services easily instead of programming for services hardly.