Abstract. A mediator helps a client of a distributed information sys-tem to acquire data without contacting each datasource. We show how mobile code can be used to ensure condentiality of data in a secure mediation system. We analyze what advantages mobile code has over mobile data for secure mediation. We present a Java implementation of a system that mediates SQL queries. Security risks for the client and the mobile code are delineated; oending the integrity of its own data is identied as a special type of attack of mobile code in a mediation system. We name appropriate countermeasures and describe the amount of trust needed in our system. As an extension, we consider security in a hierarchy of mediators. Finally, we combine mobile code w...
During the last decade the decrease in the size of computing machinery, coupled with the increase in...
In the modern communication system for Mobile agent, where security is major issue to safe transfer ...
In today‟s modern era of internet and intranet where distributed networking is spreading out its eff...
Abstract. A mediator helps a client of a distributed information sys-tem to acquire data without con...
Abstract. A mediator helps a client of a distributed information sys-tem to acquire data without con...
This paper presents a survey of existing techniques for achieving mobile code security, as well as a...
Abstract- Mobile agents are software which moves autonomously through a computer network with aim to...
Abstract. The goal of mobile agent systems is to provide a distributed computing infrastructure supp...
In this paper we discuss security in mobile object systems. Mobile object systems embody a paradigm ...
This dissertation presents a novel security architecture called security-passing style and motivates...
The Sanctuary mobile code system includes security mechanisms for protecting mobile agents from mali...
Mobile code is now a nearly inescapable component of modern computing, thanks to client-side code th...
We consider the problems raised by the use of mobile code in e-Science. If a user submits a program ...
Code mobility can be defined as the capability to dynamically change the bindings between code fragm...
Abstract. Recent work has shown that several cryptographic protocols for the protection of free-roam...
During the last decade the decrease in the size of computing machinery, coupled with the increase in...
In the modern communication system for Mobile agent, where security is major issue to safe transfer ...
In today‟s modern era of internet and intranet where distributed networking is spreading out its eff...
Abstract. A mediator helps a client of a distributed information sys-tem to acquire data without con...
Abstract. A mediator helps a client of a distributed information sys-tem to acquire data without con...
This paper presents a survey of existing techniques for achieving mobile code security, as well as a...
Abstract- Mobile agents are software which moves autonomously through a computer network with aim to...
Abstract. The goal of mobile agent systems is to provide a distributed computing infrastructure supp...
In this paper we discuss security in mobile object systems. Mobile object systems embody a paradigm ...
This dissertation presents a novel security architecture called security-passing style and motivates...
The Sanctuary mobile code system includes security mechanisms for protecting mobile agents from mali...
Mobile code is now a nearly inescapable component of modern computing, thanks to client-side code th...
We consider the problems raised by the use of mobile code in e-Science. If a user submits a program ...
Code mobility can be defined as the capability to dynamically change the bindings between code fragm...
Abstract. Recent work has shown that several cryptographic protocols for the protection of free-roam...
During the last decade the decrease in the size of computing machinery, coupled with the increase in...
In the modern communication system for Mobile agent, where security is major issue to safe transfer ...
In today‟s modern era of internet and intranet where distributed networking is spreading out its eff...