The protection of computer software---its technology and applications
An object-based programming model for shared data
ACM Transactions on Programming Languages and Systems (TOPLAS)
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
Java Security: From HotJava to Netscape and Beyond
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
A proxy-based filtering mechanism for the mobile environment
A proxy-based filtering mechanism for the mobile environment
Hi-index | 0.04 |
Abstract: Mobile agents are tasks or processes which can be autonomously delegated or transferred from one network node to another: This distributed computing paradigm is modern and powerful. Many network-based applications have been developed or designed under this model. The application areas include, for example, intelligent agent, network and system management, web-based mobile applets, electronic commerce and more recently, active networking. While offering a new attractive paradigm over the Internet, this mobile agent technology introduces significant new security threats. For example, a malicious agent with certain access rights might be able to destroy critical information on the nodes it visits. LAVA is a proposed architecture to facilitate secure delegation of executable code. In this paper we present this architecture, its design, and our prototype implementation. One SNMP network management application has been developed on top of the LAVA prototype.