Journal of Cryptology
Authentication in distributed systems: theory and practice
ACM Transactions on Computer Systems (TOCS)
Communications of the ACM
Cryptographic Traces for Mobile Agents
Mobile Agents and Security
Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts
Mobile Agents and Security
Authentication for Mobile Agents
Mobile Agents and Security
Security Issues in Mobile Code Systems
Mobile Agents and Security
Language Issues in Mobile Program Security
Mobile Agents and Security
D'Agents: Security in a Multiple-Language, Mobile-Agent System
Mobile Agents and Security
Mobile Agents and Security
Mobile Agents and Security
Protecting Mobile Agents Against Malicious Hosts
Mobile Agents and Security
Safe, Untrusted Agents Using Proof-Carrying Code
Mobile Agents and Security
Analyzing Mobile Code Languages
MOS '96 Selected Presentations and Invited Papers Second International Workshop on Mobile Object Systems - Towards the Programmable Internet
Dynamic analysis of security protocols
Proceedings of the 2000 workshop on New security paradigms
Searching for a black hole in arbitrary networks: optimal mobile agent protocols
Proceedings of the twenty-first annual symposium on Principles of distributed computing
An environment for security protocol intrusion detection
Journal of Computer Security
Secure Authorisation Agent for Cross-Domain Access Control in a Mobile Computing Environment
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Trust Relationships in a Mobile Agent System
MA '01 Proceedings of the 5th International Conference on Mobile Agents
PMMAP: A Mobile Agents Platform for Program Mining
ICCNMC '01 Proceedings of the 2001 International Conference on Computer Networks and Mobile Computing (ICCNMC'01)
Secure web transaction with anonymous mobile agent over internet
Journal of Computer Science and Technology
Data protection and data sharing in telematics
Mobile Networks and Applications
Mobile Information Systems
A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
Black Hole Search with Tokens in Interconnected Networks
SSS '09 Proceedings of the 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems
Data Privacy in Tuple Space Based Mobile Agent Systems
Electronic Notes in Theoretical Computer Science (ENTCS)
Network decontamination with local immunization
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Modeling architecture for collaborative virtual objects based on services
Journal of Network and Computer Applications
Distributed security algorithms by mobile agents
ICDCN'06 Proceedings of the 8th international conference on Distributed Computing and Networking
Maximizing utility of mobile agent based e-commerce applications with trust enhanced security
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
Black hole search in asynchronous rings using tokens
CIAC'06 Proceedings of the 6th Italian conference on Algorithms and Complexity
Black hole search in directed graphs
SIROCCO'09 Proceedings of the 16th international conference on Structural Information and Communication Complexity
Periodic data retrieval problem in rings containing a malicious host
SIROCCO'10 Proceedings of the 17th international conference on Structural Information and Communication Complexity
Searching for a black hole in interconnected networks using mobile agents and tokens
Journal of Parallel and Distributed Computing
Hi-index | 0.24 |
This article elaborates on security issues related to mobile code and agent-based systems. In particular, it addresses the problems of (a) how to protect an execution environment against potentially malicious mobile code, and (b) how to protect the mobile code against potentially malicious hosts and execution environments. The article overviews and discusses some technical approaches to address the problems. It concludes with the insight that possible solutions for the problems are not independent, and that some solutions for problem (b) make it more difficult to find appropriate solutions for problem (a).