Abstract. A mediator helps a client of a distributed information sys-tem to acquire data without contacting each datasource. We show how mobile code can be used to ensure confidentiality of data in a secure mediation system. We analyze what advantages mobile code has over mobile data for secure mediation. We present a Java implementation of a system that mediates SQL queries. Security risks for the client and the mobile code are delineated; offending the integrity of its own data is identified as a special type of attack of mobile code in a mediation system. We name appropriate countermeasures and describe the amount of trust needed in our system. As an extension, we consider security in a hierarchy of mediators. Finally, we combine mobile ...
Abstract. Recent work has shown that several cryptographic protocols for the protection of free-roam...
In the modern communication system for Mobile agent, where security is major issue to safe transfer ...
This thesis' objective is to provide privacy to mobile code. A practical example of mobile code is a...
Abstract. A mediator helps a client of a distributed information sys-tem to acquire data without con...
Abstract. A mediator helps a client of a distributed information sys-tem to acquire data without con...
This paper presents a survey of existing techniques for achieving mobile code security, as well as a...
Mobile code is now a nearly inescapable component of modern computing, thanks to client-side code th...
Abstract- Mobile agents are software which moves autonomously through a computer network with aim to...
This dissertation presents a novel security architecture called security-passing style and motivates...
Abstract. The goal of mobile agent systems is to provide a distributed computing infrastructure supp...
The Sanctuary mobile code system includes security mechanisms for protecting mobile agents from mali...
In this paper we discuss security in mobile object systems. Mobile object systems embody a paradigm ...
We consider the problems raised by the use of mobile code in e-Science. If a user submits a program ...
During the last decade the decrease in the size of computing machinery, coupled with the increase in...
Code mobility can be defined as the capability to dynamically change the bindings between code fragm...
Abstract. Recent work has shown that several cryptographic protocols for the protection of free-roam...
In the modern communication system for Mobile agent, where security is major issue to safe transfer ...
This thesis' objective is to provide privacy to mobile code. A practical example of mobile code is a...
Abstract. A mediator helps a client of a distributed information sys-tem to acquire data without con...
Abstract. A mediator helps a client of a distributed information sys-tem to acquire data without con...
This paper presents a survey of existing techniques for achieving mobile code security, as well as a...
Mobile code is now a nearly inescapable component of modern computing, thanks to client-side code th...
Abstract- Mobile agents are software which moves autonomously through a computer network with aim to...
This dissertation presents a novel security architecture called security-passing style and motivates...
Abstract. The goal of mobile agent systems is to provide a distributed computing infrastructure supp...
The Sanctuary mobile code system includes security mechanisms for protecting mobile agents from mali...
In this paper we discuss security in mobile object systems. Mobile object systems embody a paradigm ...
We consider the problems raised by the use of mobile code in e-Science. If a user submits a program ...
During the last decade the decrease in the size of computing machinery, coupled with the increase in...
Code mobility can be defined as the capability to dynamically change the bindings between code fragm...
Abstract. Recent work has shown that several cryptographic protocols for the protection of free-roam...
In the modern communication system for Mobile agent, where security is major issue to safe transfer ...
This thesis' objective is to provide privacy to mobile code. A practical example of mobile code is a...