We consider the problems raised by the use of mobile code in e-Science. If a user submits a program for execution on a remote machine then problems can arise if the program misbehaves, for example by using too much memory or taking too long to execute. We describe methods which can be used to obtain unforgeable a priori guarantees that a mobile program will behave in a reasonable manner. We have a prototype implementation that executes mobile code securely within an OGSA-DAI server.
Abstract. Mobile code refers to programs that come into a host computer over the network and start t...
Abstract. The goal of mobile agent systems is to provide a distributed computing infrastructure supp...
In this paper we discuss security in mobile object systems. Mobile object systems embody a paradigm ...
This paper presents a survey of existing techniques for achieving mobile code security, as well as a...
Mobile code can potentially be malicious. To protect the local system against malicious mobile code,...
Code mobility can be defined as the capability to dynamically change the bindings between code fragm...
Sun's announcement of the programming language Java more than anything popularized the notion of mob...
sekar @ cs.sunysb.edu Existing approaches for mobile code security tend to take a conser-vative view...
This dissertation presents a novel security architecture called security-passing style and motivates...
Abstract: Mobile code systems are technologies that allow applications to move their codes, and poss...
Abstract. A mediator helps a client of a distributed information sys-tem to acquire data without con...
This report describes Android secure coding rules, guidelines, and static analysis that were develop...
Java is the predominant language for mobile agent systems, both for implementing mobile agent execut...
Abstract Java is one of the most famous mobile code systems, and its components can be dynamically d...
The safety of the Java Virtual Machine is founded on bytecode verification. Although verification co...
Abstract. Mobile code refers to programs that come into a host computer over the network and start t...
Abstract. The goal of mobile agent systems is to provide a distributed computing infrastructure supp...
In this paper we discuss security in mobile object systems. Mobile object systems embody a paradigm ...
This paper presents a survey of existing techniques for achieving mobile code security, as well as a...
Mobile code can potentially be malicious. To protect the local system against malicious mobile code,...
Code mobility can be defined as the capability to dynamically change the bindings between code fragm...
Sun's announcement of the programming language Java more than anything popularized the notion of mob...
sekar @ cs.sunysb.edu Existing approaches for mobile code security tend to take a conser-vative view...
This dissertation presents a novel security architecture called security-passing style and motivates...
Abstract: Mobile code systems are technologies that allow applications to move their codes, and poss...
Abstract. A mediator helps a client of a distributed information sys-tem to acquire data without con...
This report describes Android secure coding rules, guidelines, and static analysis that were develop...
Java is the predominant language for mobile agent systems, both for implementing mobile agent execut...
Abstract Java is one of the most famous mobile code systems, and its components can be dynamically d...
The safety of the Java Virtual Machine is founded on bytecode verification. Although verification co...
Abstract. Mobile code refers to programs that come into a host computer over the network and start t...
Abstract. The goal of mobile agent systems is to provide a distributed computing infrastructure supp...
In this paper we discuss security in mobile object systems. Mobile object systems embody a paradigm ...