Sciweavers

2897 search results - page 3 / 580
» Mobile Code Security
Sort
View
MA
2000
Springer
135views Communications» more  MA 2000»
13 years 9 months ago
Principles of Mobile Maude
Mobile Maude is a mobile agent language extending the rewriting logic language Maude and supporting mobile computation. Mobile Maude uses reflection to obtain a simple and general ...
Francisco Durán, Steven Eker, Patrick Linco...
ESORICS
2000
Springer
13 years 9 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
OOPSLA
2005
Springer
13 years 11 months ago
Formalising Java RMI with explicit code mobility
Alexander Ahern, Nobuko Yoshida
EUROPKI
2007
Springer
14 years 6 days ago
Security-by-Contract: Toward a Semantics for Digital Signatures on Mobile Code
In this paper we propose the notion of security-by-contract, a mobile contract that an application carries with itself. The key idea of the framework is that a digital signature sh...
Nicola Dragoni, Fabio Massacci, Katsiaryna Naliuka...
POPL
2000
ACM
13 years 10 months ago
A Type System for Expressive Security Policies
Certified code is a general mechanism for enforcing security properties. In this paradigm, untrusted mobile code carries annotations that allow a host to verify its trustworthine...
David Walker