Views
3 years ago

Electronic Edition

Electronic Edition

The operation sequence

The operation sequence illustrated in Figure 6for retrieving and decrypted the web mail pageis summarized below:1. User enters password to unlock page2. Applet retrieves K encrypted private keyfrom session cookie and decrypt itwith user password to get K private .3. Applet retrieves encrypted contentfrom session cookie and decrypt itwith K private4. Display original web page.In the above example, we achieved storing themail content locally and avoid securityexposure by encrypting the information usinga public/private key mechanism together withthe user password. The generation of theencrypted private key K encrypted private key usingthe user password guarantees that the originalkey K private is securely stored locally. Theoriginal private key can be readily recoveredwhen a user enters the password to unlock thepage.The important features illustrated by thisexample are the time-out and securityfunctions that are provided by the attachedapplet agent in the html page. In general,different applets can be attached to differenthtml pages depending on their data contentand specific needs. It is also important tonote that information is securely storedlocally to satisfy the requirement that theuser can still retrieve the locked page evenwhere there is no server connection. This isachieved by using a double encryptiontechnique using the pubic/private keys andthe user password as the main entrance key.ConclusionsIn this report, we have described animplementation of an agent embedded in webcontent which provides a self-protectionfunction for a delivered page without abrowser plug-in even after server connection isdisconnected. We have also described adouble encryption scheme which allowssecured mail content to be stored locally at theclient side to avoid security exposure. Themethodology described in this report providesa convenient way of adding autonomousfunctions[4] to web data contents at the clientside, especially in situations where specializedplug-ins are not available. This approach andconcept can be extended to enable other selfmanagingfunctions and personalizedbehaviors for web content using dynamicattachment of agents depending on datacontent, user information and otherenvironment criteria in a client/serverdistributed environment. Despite many of itsgood points, this approach has its drawbacks,namely, its limitation by the size of the appletand the complexities of maintaining arepository of available applets.References[1] Intelligent Agents: Theory and Practice12/2/99 - Mike Wooldridge and Nick Jennings,Intelligent Agents: Theory and Practice,Knowledge Engineering Review, v10n2, June1995.[2] Agent-Based Engineering, the Web, andIntelligence – Charles J. Petrie. December1996 issue of IEEE Expert.[3] Intelligent Agents in Cyberspace -1999 AAAI Spring Symposium,http://www.aaai.org/Press/Reports/Symposia/Spring/ss-99-03.html.[4] Jeff O. Kephart, David M. Chess, "TheVision of Autonomic Computing", ComputerJournal, IEEE Computer Society, January2003 issue[5] Java Plug-in Component -http ://java.sun.com/j2se/1.4.2/docs/guide/plugin/[6] Applet Resources - http://java.sun.com/applets/[7] Java-enabled browsers -http://physics.syr.edu/courses/java/browsers.html[8] JavaScript to Java Communication –http://java.sun.com/j2se/1.4.2/docs/guide/plugin/developer_guide/js_java.html[9] LiveConnect/Plug-in Developer's Guidehttp://wp.netscape.com/eng/mozilla/3.0/handbook/plugins/[10] JSObject –http://wp.netscape.com/eng/mozilla/3.0/handbook/plugins/doc/netscape.javascript.JSObject.html[11] DOM – Document Object Modelhttp://www.w3.org/DOM/The 2nd Workshop on Web-based Support Systems 2004 50

[12] Public Key Cryptography -http://en.wikipedia.org/wiki/Public_key[13] Public Key Cryptographyhttp://www.verisign.com/repository/crptintr.html[14] Browser Session Cookiehttp://www.mach5.com/support/analyzer/manual/html/Java is a trade mark of Sun MicroSystems Inc.The 2nd Workshop on Web-based Support Systems 2004 51

x.med.a - electronic edition - FoAM
to see an electronic edition of this week's Ariel - Ex-bbc.net
to see an electronic edition of this week's Ariel - Noticeboard for ...
to see an electronic edition of this week's Ariel - Noticeboard for ...
tuesday, june 9, 2009 - Courier Electronic Edition
How to Diagnose and Fix Everything Electronic, Second Edition
How to Diagnose and Fix Everything Electronic, Second Edition (Michael Jay Geier)
TUESDAY, JULY 28, 2009 The Courier • - Courier Electronic Edition
to open the online edition click here or - High Frequency Electronics
SMD-codes databook 2012 edition - Turuta Electronics World
Fundamental Electrical and Electronic Principles, Third Edition
Chinese art and culture (illustrated edition)(Chinese Edition)
to see an electronic edition of this week's Ariel - Ex-bbc.net
Special Edition Using XML, Second Edition
Getting Started in Advanced Options, Illustrated Edition
Madlibs - Franklin Electronic Publishers
to see an electronic edition of this week's Ariel - Noticeboard for ...
to see an electronic edition of this week's Ariel - Ex-bbc.net
to see an electronic edition of this week's Ariel - Noticeboard for ...
Wood's edition of the songs of Scotland : adapted to their ...
Identity theft - Maplin Electronics
N57QK_manual.pdf filesize - Maplin Electronics
Premiere Edition - ACEC|Manitoba
to see an electronic edition of this week's Ariel - Ex-bbc.net
to see an electronic edition of this week's Ariel - Noticeboard for ...