Sciweavers

45 search results - page 1 / 9
» A Confinement Criterion for Securely Executing Mobile Code
Sort
View
JALC
2006
125views more  JALC 2006»
13 years 4 months ago
A Confinement Criterion for Securely Executing Mobile Code
Mobile programs, like applets, are not only ubiquitous, but also potentially malicious. We study the case where mobile programs are executed by a host system in a secured environm...
Hervé Grall
SP
1998
IEEE
147views Security Privacy» more  SP 1998»
13 years 9 months ago
Secure Execution of Java Applets using a Remote Playground
Dahlia Malkhi, Michael K. Reiter, Aviel D. Rubin
ICECCS
2005
IEEE
86views Hardware» more  ICECCS 2005»
13 years 10 months ago
Exploiting OS-Level Mechanisms to Implement Mobile Code Security
Mobile code systems provide an infrastructure that supports autonomous mobile components, called mobile agents. The infrastructure implements services for the transfer, execution,...
Viktoria Felmetsger, Giovanni Vigna
SOSP
2003
ACM
14 years 1 months ago
Model-carrying code: a practical approach for safe execution of untrusted applications
This paper presents a new approach called model-carrying code (MCC) for safe execution of untrusted code. At the heart of MCC is the idea that untrusted code comes equipped with a...
R. Sekar, V. N. Venkatakrishnan, Samik Basu, Sande...
SAC
2002
ACM
13 years 4 months ago
Secure mobile agent systems using Java: where are we heading?
Java is the predominant language for mobile agent systems, both for implementing mobile agent execution environments and for writing mobile agent applications. This is due to inhe...
Walter Binder, Volker Roth