Generative communication in Linda
ACM Transactions on Programming Languages and Systems (TOPLAS)
The internet worm program: an analysis
ACM SIGCOMM Computer Communication Review
Viruses and worms - What can they do?
ACM SIGSAC Review
The official PGP user's guide
Proceedings of the 24th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
KLAIM: A Kernel Language for Agents Interaction and Mobility
IEEE Transactions on Software Engineering
On bisimulations of the asynchronous &pgr;-calculus
Theoretical Computer Science
Proceedings of the 21st international conference on Software engineering
Inside Java 2 platform security architecture, API design, and implementation
Inside Java 2 platform security architecture, API design, and implementation
Theoretical Computer Science
Jini Specification
JavaSpaces Principles, Patterns, and Practice
JavaSpaces Principles, Patterns, and Practice
The Java Programming Language
A Java Middleware for Guaranteeing Privacy of Distributed Tuple Spaces
FIDJI '01 Revised Papers from the International Workshop on Scientific Engineering for Distributed Java Applications
On Asynchronous Communication Semantics
ECOOP '91 Proceedings of the Workshop on Object-Based Concurrent Computing
Jada - Coordination and Communication for Java Agents
MOS '96 Selected Presentations and Invited Papers Second International Workshop on Mobile Object Systems - Towards the Programmable Internet
KLAVA: a Java package for distributed and mobile applications
Software—Practice & Experience
ISADS '01 Proceedings of the Fifth International Symposium on Autonomous Decentralized Systems
IBM Systems Journal
Research note: Security issues related to mobile code and agent-based systems
Computer Communications
Hi-index | 0.00 |
More recently, distributed variants of tuple spaces have been proposed to exploit the Linda model for programming distributed applications over wide area networks, possibly exploiting code mobility. However, the flexibility of the shared tuple space model opens possible security holes; it basically provides no access protection to the shared data. In this paper we investigate some possible scenarios where mobile agents can benefit from our cryptographic tuple space based framework, CryptoKlava, and sketch how to possibly implement such agents in order to keep the privacy of items collected by the mobile agent during its itinerary. The functionalities of the framework are general enough to be applied to other Java frameworks using multiple distributed tuples spaces possibly dealing with code mobility.