Sciweavers

45 search results - page 3 / 9
» A Confinement Criterion for Securely Executing Mobile Code
Sort
View
MAS
1998
Springer
172views Communications» more  MAS 1998»
13 years 10 months ago
Protecting Mobile Agents Against Malicious Hosts
A key element of any mobile code based distributed system are the security mechanisms available to protect (a) the host against potentially hostile actions of a code fragment under...
Tomas Sander, Christian F. Tschudin
MA
2001
Springer
175views Communications» more  MA 2001»
13 years 10 months ago
Evaluating the Security of Three Java-Based Mobile Agent Systems
Abstract. The goal of mobile agent systems is to provide a distributed computing infrastructure supporting applications whose components can move between different execution enviro...
Sebastian Fischmeister, Giovanni Vigna, Richard A....
ISW
2004
Springer
13 years 11 months ago
Universally Composable Secure Mobile Agent Computation
We study the security challenges faced by the mobile agent paradigm, where code travels and performs computations on remote hosts in an autonomous manner. We define universally co...
Ke Xu, Stephen R. Tate
DOA
2000
159views more  DOA 2000»
13 years 7 months ago
Mobile Code as an Enabling Technology for Service-Oriented Smartcard Middleware
Smartcards can be seen as service providing entities that implement a secure, tamper-proof storage and offer computational resources which make them ideally suited for a variety o...
Roger Kehr, Michael Rohs, Harald Vogt
MATA
2004
Springer
149views Communications» more  MATA 2004»
13 years 11 months ago
Detecting and Proving Manipulation Attacks in Mobile Agent Systems
Mobile agents are software entities consisting of code, data and state that can migrate autonomously from host to host executing their code. Unfortunately, security issues restrict...
Oscar Esparza, Miguel Soriano, Jose L. Muño...