Title :
Protecting mobile code
Author_Institution :
Int. Comput. Sci. Inst., Berkeley, CA, USA
Abstract :
There are at least two major security challenges in mobile code distributed systems. First hosts have to be protected from potentially malicious actions of mobile code they are executing. Many techniques are known which address this problem. Second mobile agents themselves have to be protected against malicious hosts. Satisfactory ways to deal with the second problem are necessary features for many of the (security-sensitive) tasks mobile agent (MA) systems are envisioned for, e.g., in e-commerce applications where a shopping agent is sent out on the Internet, vendors have a high incentive in tampering with these agents. The key point is is that the originator of the agent needs to have sound guarantees that the results an agent brings back are correct. Why else should he send out the agent in the first place?
Keywords :
copy protection; distributed programming; security of data; Internet; e-commerce applications; malicious hosts; mobile agents; mobile code distributed systems; potentially malicious actions; security challenges; shopping agent; vendors; Application software; Computer security; Cryptography; Data security; Databases; Electrical capacitance tomography; IP networks; Internet; Mobile agents; Software protection;
Conference_Titel :
Software Reliability Engineering, 1998. Proceedings. The Ninth International Symposium on
Conference_Location :
Paderborn
Print_ISBN :
0-8186-8991-9
DOI :
10.1109/ISSRE.1998.730880