Trust (and mistrust) in secure applications
Communications of the ACM
A security architecture and design for mobile intelligent agent systems
ACM SIGAPP Applied Computing Review
Classification of malicious host threats in mobile agent computing
SAICSIT '02 Proceedings of the 2002 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology
Enabling trusted software integrity
Proceedings of the 10th international conference on Architectural support for programming languages and operating systems
ACM Transactions on Internet Technology (TOIT)
Spy: A Method to Secure Clients for Network Services
ICDCSW '02 Proceedings of the 22nd International Conference on Distributed Computing Systems
Protecting Mobile Code in the Wild
IEEE Internet Computing
Safe Areas of Computation for Secure Computing with Insecure Applications
ACSAC '99 Proceedings of the 15th Annual Computer Security Applications Conference
Secure compartmented data access over an untrusted network using a COTS-based architecture
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
Protecting Data from Malicious Software
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
Computer
Why Secure Applications Are Difficult to Write
IEEE Security and Privacy
Trust-Adapted Enforcement of Security Policies in Distributed Component-Structured Applications
ISCC '01 Proceedings of the Sixth IEEE Symposium on Computers and Communications
A System to Specify and Manage Multipolicy Access Control Models
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Terra: a virtual machine-based platform for trusted computing
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Securing distributed computing against the hostile host
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
Attestation-based policy enforcement for remote access
Proceedings of the 11th ACM conference on Computer and communications security
Semantic remote attestation: a virtual machine directed approach to trusted computing
VM'04 Proceedings of the 3rd conference on Virtual Machine Research And Technology Symposium - Volume 3
Hi-index | 0.00 |
Security in host-based computing continues to be an area of regular research. Problems in host-based security exist in three principal areas: application protection, host environment protection, and data protection. These three areas echo the security issues for mobile agents: protecting agents from hostile hosts, protecting hosts from agents, and protecting data in transit as identified in Vuong and Peng (2001). Mobile agents are specialized applications which travel between hosts. Mobility is achieved by passing data and execution parameters from one host to another. A parallel can be drawn between mobile agents and host-based applications considering both perform host-based computations. In this paper we regard the security challenges for mobile agents equivalent to those of applications installed on a host. Furthermore, we also consider a circular threat that exists between applications and the host environment.