Sciweavers

104 search results - page 3 / 21
» An end-to-end approach to host mobility
Sort
View
DASC
2006
IEEE
13 years 10 months ago
Runtime Security Verification for Itinerary-Driven Mobile Agents
We present a new approach to ensure the secure execution of itinerary-driven mobile agents, in which the specification of the navigational behavior of an agent is separated from t...
Zijiang Yang, Shiyong Lu, Ping Yang
AINA
2007
IEEE
14 years 21 days ago
Enforcing Fine-Grained Authorization Policies for Java Mobile Agents
The Mobile Agent (MA) paradigm advocates the migration of agent code to achieve computational goals. MAs require an executable environment on hosts where mobile code can be execut...
Giovanni Russello, Changyu Dong, Naranker Dulay
MATA
2004
Springer
149views Communications» more  MATA 2004»
13 years 11 months ago
Detecting and Proving Manipulation Attacks in Mobile Agent Systems
Mobile agents are software entities consisting of code, data and state that can migrate autonomously from host to host executing their code. Unfortunately, security issues restrict...
Oscar Esparza, Miguel Soriano, Jose L. Muño...
ICPPW
2000
IEEE
13 years 10 months ago
Interoperation of Mobile IPv6 and Protocol Independent Multicast Dense Mode
This paper discusses different approaches of providing multicast traffic for mobile hosts. Mobile IPv6 is used for mobility support. The network employs Protocol Independent Multi...
Christian Bettstetter, Anton Riedl, Gerhard Ge&szl...
ISCC
2009
IEEE
176views Communications» more  ISCC 2009»
14 years 1 months ago
Integrating user Identity Management systems with the Host Identity Protocol
Abstract—Identity Management (IdM) on the application layer improves the usability and security for end users by offering features like Single Sign-On and attribute provisioning....
Marc Barisch, Alfredo Matos