This thesis' objective is to provide privacy to mobile code. A practical example of mobile code is a mobile software agent that performs a task on behalf of its user. The agent travels over the network and is executed at different locations of which beforehand it is not known whether or not these can be trusted. Because a mobile software agent performs actions on behalf of its user, agent must be protected in order to provide privacy to the user. For example, a software agent must purchase a flight ticket. Other parties like airlines are then not entitled to know the agent's strategy when the agent will purchase the ticket. In this thesis, several solutions are provided to this problem, and to obtain more in depth knowledge on protecting pr...
Code mobility can be defined as the capability to dynamically change the bindings between code fragm...
Abstract: Mobile code systems are technologies that allow applications to move their codes, and poss...
In a mobile computing environment, it is desirable to protect information about the movements and ac...
This thesis' objective is to provide privacy to mobile code. A practical example of mobile code is a...
Mobile code technology offers interesting possibilities to the practitioner, but also raises strong ...
Mobile code technology offers interesting possibilities to the practitioner, but also raises strong ...
This position paper discusses the problem of evaluating a function on an untrusted host, while maint...
Abstract- Mobile agents are software which moves autonomously through a computer network with aim to...
This paper presents a survey of existing techniques for achieving mobile code security, as well as a...
Smartphones and mobile applications have become an essential part of our daily lives. People always ...
Abstract—The Privacy by Design concept proposes to integrate respect for user privacy into systems m...
Mobile code is now a nearly inescapable component of modern computing, thanks to client-side code th...
International audienceMobile devices are widely used nowadays with two market leaders: iOS and Andro...
International audienceThe Privacy by Design concept proposes to integrate the respect of user privac...
We address the problem of protecting the privacy of individuals in the information society. Our goal...
Code mobility can be defined as the capability to dynamically change the bindings between code fragm...
Abstract: Mobile code systems are technologies that allow applications to move their codes, and poss...
In a mobile computing environment, it is desirable to protect information about the movements and ac...
This thesis' objective is to provide privacy to mobile code. A practical example of mobile code is a...
Mobile code technology offers interesting possibilities to the practitioner, but also raises strong ...
Mobile code technology offers interesting possibilities to the practitioner, but also raises strong ...
This position paper discusses the problem of evaluating a function on an untrusted host, while maint...
Abstract- Mobile agents are software which moves autonomously through a computer network with aim to...
This paper presents a survey of existing techniques for achieving mobile code security, as well as a...
Smartphones and mobile applications have become an essential part of our daily lives. People always ...
Abstract—The Privacy by Design concept proposes to integrate respect for user privacy into systems m...
Mobile code is now a nearly inescapable component of modern computing, thanks to client-side code th...
International audienceMobile devices are widely used nowadays with two market leaders: iOS and Andro...
International audienceThe Privacy by Design concept proposes to integrate the respect of user privac...
We address the problem of protecting the privacy of individuals in the information society. Our goal...
Code mobility can be defined as the capability to dynamically change the bindings between code fragm...
Abstract: Mobile code systems are technologies that allow applications to move their codes, and poss...
In a mobile computing environment, it is desirable to protect information about the movements and ac...