This paper presents a survey of existing techniques for achieving mobile code security, as well as a representative sampling of systems which use them. In particular, the problem domain is divided into two portions: protecting hosts from malicious code; and protecting mobile code from malicious hosts. The discussion of the malicious code problem includes a more in-depth study of the Java security model, as well as touching upon several other systems. The malicious host problem, however, is much more difficult to solve, so our discussion is mostly restricted to ongoing research in that area
Next generation mobile networks and services are gaining market momentum every day. Service provider...
The Sanctuary mobile code system includes security mechanisms for protecting mobile agents from mali...
If software is designed so that the software can issue functions that will move that software from o...
This paper presents a survey of existing techniques for achieving mobile code security, as well as a...
This dissertation presents a novel security architecture called security-passing style and motivates...
Sun's announcement of the programming language Java more than anything popularized the notion of mob...
Abstract- Mobile agents are software which moves autonomously through a computer network with aim to...
AbstractClient software for modern service-oriented web architectures is often implemented as mobile...
Code mobility can be defined as the capability to dynamically change the bindings between code fragm...
Mobile code can potentially be malicious. To protect the local system against malicious mobile code,...
Abstract: A mobile code application can be easily integrated by using existing software components, ...
We consider the problems raised by the use of mobile code in e-Science. If a user submits a program ...
. Many programming languages have been developed and implemented for mobile code environments. They ...
Abstract. The goal of mobile agent systems is to provide a distributed computing infrastructure supp...
Abstract: Mobile code systems are technologies that allow applications to move their codes, and poss...
Next generation mobile networks and services are gaining market momentum every day. Service provider...
The Sanctuary mobile code system includes security mechanisms for protecting mobile agents from mali...
If software is designed so that the software can issue functions that will move that software from o...
This paper presents a survey of existing techniques for achieving mobile code security, as well as a...
This dissertation presents a novel security architecture called security-passing style and motivates...
Sun's announcement of the programming language Java more than anything popularized the notion of mob...
Abstract- Mobile agents are software which moves autonomously through a computer network with aim to...
AbstractClient software for modern service-oriented web architectures is often implemented as mobile...
Code mobility can be defined as the capability to dynamically change the bindings between code fragm...
Mobile code can potentially be malicious. To protect the local system against malicious mobile code,...
Abstract: A mobile code application can be easily integrated by using existing software components, ...
We consider the problems raised by the use of mobile code in e-Science. If a user submits a program ...
. Many programming languages have been developed and implemented for mobile code environments. They ...
Abstract. The goal of mobile agent systems is to provide a distributed computing infrastructure supp...
Abstract: Mobile code systems are technologies that allow applications to move their codes, and poss...
Next generation mobile networks and services are gaining market momentum every day. Service provider...
The Sanctuary mobile code system includes security mechanisms for protecting mobile agents from mali...
If software is designed so that the software can issue functions that will move that software from o...