Sciweavers

MAS
1998
Springer
172views Communications» more  MAS 1998»
13 years 8 months ago
Protecting Mobile Agents Against Malicious Hosts
A key element of any mobile code based distributed system are the security mechanisms available to protect (a) the host against potentially hostile actions of a code fragment under...
Tomas Sander, Christian F. Tschudin
SIGOPSE
1998
ACM
13 years 8 months ago
Nested Java processes: OS structure for mobile code
The majority of work on protection in single-language mobile code environments focuses on information security issues and depends on the language environment for solutions to the ...
Patrick Tullmann, Jay Lepreau
HPDC
1999
IEEE
13 years 8 months ago
Baglets: Adding Hierarchical Scheduling to Aglets
A significant number of new Java-based technologies for mobile code (aka agents) have recently emerged. The 'Aglets' system, from IBM's research labs, provides an e...
Arvind Gopalan, Sajid Saleem, Matthias Martin, Dan...
ACSAC
2000
IEEE
13 years 8 months ago
A Flexible Access Control Service for Java Mobile Code
Mobile Code (MC) technologies provide appealing solutionsfor the development of Internet applications.For instance, Java technologyfacilitates dynamic loading of application code ...
Antonio Corradi, Rebecca Montanari, Cesare Stefane...
ISSRE
2003
IEEE
13 years 9 months ago
A Framework for Tamper Detection Marking of Mobile Applications
Today’s applications are highly mobile; we download software from the Internet, machine executable code arrives attached to electronic mail, and Java applets increase the functi...
Mike Jochen, Lisa M. Marvel, Lori L. Pollock
ISCIS
2004
Springer
13 years 9 months ago
Modelling Mobility with PEPA Nets
We explain the use of PEPA nets in documenting high-level designs of mobile code and mobile computing systems. This modelling language (which allows the modeller to differentiate ...
Jane Hillston, Marina Ribaudo
ISPDC
2005
IEEE
13 years 10 months ago
Towards Introducing Code Mobility on J2ME
This paper makes the case why mobile code is an appropriate solution for platforms running on mobile devices aggregated in mobile ad-hoc networks. It also presents a solution
Laurentiu Lucian Petrea, Dan Grigoras
ICECCS
2005
IEEE
87views Hardware» more  ICECCS 2005»
13 years 10 months ago
Scavenging Complex Genomic Information Using Mobile Code: An Evaluation
Mobile code solutions can improve the performances of applications over the Internet by reducing the amount of data that must be transferred across the network. The research on ge...
Mauro Pezzè, Davide Tosi, Gian Pietro Picco
ICECCS
2005
IEEE
86views Hardware» more  ICECCS 2005»
13 years 10 months ago
Exploiting OS-Level Mechanisms to Implement Mobile Code Security
Mobile code systems provide an infrastructure that supports autonomous mobile components, called mobile agents. The infrastructure implements services for the transfer, execution,...
Viktoria Felmetsger, Giovanni Vigna
EUROPKI
2007
Springer
13 years 10 months ago
Security-by-Contract: Toward a Semantics for Digital Signatures on Mobile Code
In this paper we propose the notion of security-by-contract, a mobile contract that an application carries with itself. The key idea of the framework is that a digital signature sh...
Nicola Dragoni, Fabio Massacci, Katsiaryna Naliuka...