Views
3 years ago

Electronic Edition

Electronic Edition

The operation sequence

The operation sequence illustrated in Figure 6for retrieving and decrypted the web mail pageis summarized below:1. User enters password to unlock page2. Applet retrieves K encrypted private keyfrom session cookie and decrypt itwith user password to get K private .3. Applet retrieves encrypted contentfrom session cookie and decrypt itwith K private4. Display original web page.In the above example, we achieved storing themail content locally and avoid securityexposure by encrypting the information usinga public/private key mechanism together withthe user password. The generation of theencrypted private key K encrypted private key usingthe user password guarantees that the originalkey K private is securely stored locally. Theoriginal private key can be readily recoveredwhen a user enters the password to unlock thepage.The important features illustrated by thisexample are the time-out and securityfunctions that are provided by the attachedapplet agent in the html page. In general,different applets can be attached to differenthtml pages depending on their data contentand specific needs. It is also important tonote that information is securely storedlocally to satisfy the requirement that theuser can still retrieve the locked page evenwhere there is no server connection. This isachieved by using a double encryptiontechnique using the pubic/private keys andthe user password as the main entrance key.ConclusionsIn this report, we have described animplementation of an agent embedded in webcontent which provides a self-protectionfunction for a delivered page without abrowser plug-in even after server connection isdisconnected. We have also described adouble encryption scheme which allowssecured mail content to be stored locally at theclient side to avoid security exposure. Themethodology described in this report providesa convenient way of adding autonomousfunctions[4] to web data contents at the clientside, especially in situations where specializedplug-ins are not available. This approach andconcept can be extended to enable other selfmanagingfunctions and personalizedbehaviors for web content using dynamicattachment of agents depending on datacontent, user information and otherenvironment criteria in a client/serverdistributed environment. Despite many of itsgood points, this approach has its drawbacks,namely, its limitation by the size of the appletand the complexities of maintaining arepository of available applets.References[1] Intelligent Agents: Theory and Practice12/2/99 - Mike Wooldridge and Nick Jennings,Intelligent Agents: Theory and Practice,Knowledge Engineering Review, v10n2, June1995.[2] Agent-Based Engineering, the Web, andIntelligence – Charles J. Petrie. December1996 issue of IEEE Expert.[3] Intelligent Agents in Cyberspace -1999 AAAI Spring Symposium,http://www.aaai.org/Press/Reports/Symposia/Spring/ss-99-03.html.[4] Jeff O. Kephart, David M. Chess, "TheVision of Autonomic Computing", ComputerJournal, IEEE Computer Society, January2003 issue[5] Java Plug-in Component -http ://java.sun.com/j2se/1.4.2/docs/guide/plugin/[6] Applet Resources - http://java.sun.com/applets/[7] Java-enabled browsers -http://physics.syr.edu/courses/java/browsers.html[8] JavaScript to Java Communication –http://java.sun.com/j2se/1.4.2/docs/guide/plugin/developer_guide/js_java.html[9] LiveConnect/Plug-in Developer's Guidehttp://wp.netscape.com/eng/mozilla/3.0/handbook/plugins/[10] JSObject –http://wp.netscape.com/eng/mozilla/3.0/handbook/plugins/doc/netscape.javascript.JSObject.html[11] DOM – Document Object Modelhttp://www.w3.org/DOM/The 2nd Workshop on Web-based Support Systems 2004 50

[12] Public Key Cryptography -http://en.wikipedia.org/wiki/Public_key[13] Public Key Cryptographyhttp://www.verisign.com/repository/crptintr.html[14] Browser Session Cookiehttp://www.mach5.com/support/analyzer/manual/html/Java is a trade mark of Sun MicroSystems Inc.The 2nd Workshop on Web-based Support Systems 2004 51

x.med.a - electronic edition - FoAM
to see an electronic edition of this week's Ariel - Ex-bbc.net
to see an electronic edition of this week's Ariel - Ex-bbc.net
to see an electronic edition of this week's Ariel - Noticeboard for ...
to see an electronic edition of this week's Ariel - Noticeboard for ...
to see an electronic edition of this week's Ariel - Noticeboard for ...
91430 SPS cover edited - Electronic Fasteners Inc
Second edition Charles Pfeil - Advanced Electronic Technology
How to Diagnose and Fix Everything Electronic, Second Edition
to see an electronic edition of this week's Ariel - Ex-bbc.net
to see an electronic edition of this week's Ariel - Noticeboard for ...
to see an electronic edition of this week's Ariel - Ex-bbc.net
to see an electronic edition of this week's Ariel - Ex-bbc.net
SMD-codes databook 2012 edition - Turuta Electronics World
Fundamental Electrical and Electronic Principles, Third Edition
to see an electronic edition of this week's Ariel - Ex-bbc.net
Automobile Electrical and Electronic Systems, Third edition
Updated Electronic Edition (Unpriced) - Vanpoulles Church Furnishers
to see an electronic edition of this week's Ariel - Noticeboard for ...
tuesday, june 9, 2009 - Courier Electronic Edition
to see an electronic edition of this week's Ariel - Noticeboard for ...