Fine-grained mobility in the Emerald system
ACM Transactions on Computer Systems (TOCS)
The cuckoo's egg: tracking a spy through the maze of computer espionage
The cuckoo's egg: tracking a spy through the maze of computer espionage
Computer
Authentication in distributed systems: theory and practice
ACM Transactions on Computer Systems (TOCS)
Active mail—a framework for implementing groupware
CSCW '92 Proceedings of the 1992 ACM conference on Computer-supported cooperative work
Endorsements, licensing, and insurance for distributed system services
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Network security: private communication in a public world
Network security: private communication in a public world
Practical Unix and Internet security (2nd ed.)
Practical Unix and Internet security (2nd ed.)
Formal Models for Computer Security
ACM Computing Surveys (CSUR)
Communications of the ACM
The Java Programming Language
Aglets: Programming Mobile Agents in Java
WWCA '97 Proceedings of the International Conference on Worldwide Computing and Its Applications
EMail With A Mind of Its Own: The Safe-Tcl Language for Enabled Mail
Proceedings of the IFIP TC6/WG6.5 International Conference on Upper Layer Protocols, Architectures and Applications
Mobile Agents: Are They a Good Idea?
MOS '96 Selected Presentations and Invited Papers Second International Workshop on Mobile Object Systems - Towards the Programmable Internet
ACM SIGOPS Operating Systems Review
COMPCON '97 Proceedings of the 42nd IEEE International Computer Conference
Process Migration in the Sprite Operating System
Process Migration in the Sprite Operating System
Agent Tcl: a flexible and secure mobile-agent system
TCLTK'96 Proceedings of the 4th conference on USENIX Tcl/Tk Workshop, 1996 - Volume 4
The Eden System: A Technical Review
IEEE Transactions on Software Engineering
Underground
First international workshop, AOSE 2000 on Agent-oriented software engineering
A Secure Payment Protocol Using Mobile Agents in an Untrusted Host Environment
ISEC '01 Proceedings of the Second International Symposium on Topics in Electronic Commerce
Secure Client Agent Environment (SCAE) for World Wide Web
EC-WEB '02 Proceedings of the Third International Conference on E-Commerce and Web Technologies
A Distributed Dynamic µFirewall Architecture with Mobile Agents and KeyNote Trust Management System
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Protecting a Mobile Agent's Route against Collusions
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
MA/LMA Architecture for Dealing with Malicious Agents in Agent-Mediated Electronic Markets
E-Commerce Agents, Marketplace Solutions, Security Issues, and Supply and Demand
The Ponder Policy Specification Language
POLICY '01 Proceedings of the International Workshop on Policies for Distributed Systems and Networks
Trust Relationships in a Mobile Agent System
MA '01 Proceedings of the 5th International Conference on Mobile Agents
An Intrusion Detection System for Aglets
MA '02 Proceedings of the 6th International Conference on Mobile Agents
Methods for Protecting a Mobile Agent's Route
ISW '99 Proceedings of the Second International Workshop on Information Security
Role-Based Access Control for E-commerce Sea-of-Data Applications
ISC '02 Proceedings of the 5th International Conference on Information Security
Security Requirements for Management Systems Using Mobile Agents
ISCC '00 Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
Intranet Security with Micro-Firewalls and Mobile Agents for Proactive Intrusion Response
ICCNMC '01 Proceedings of the 2001 International Conference on Computer Networks and Mobile Computing (ICCNMC'01)
Policy-based authentication for mobile agents
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
Maximizing utility of mobile agent based e-commerce applications with trust enhanced security
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
Black hole search in asynchronous rings using tokens
CIAC'06 Proceedings of the 6th Italian conference on Algorithms and Complexity
Reference and value semantics are equivalent for ordinary object petri nets
ICATPN'05 Proceedings of the 26th international conference on Applications and Theory of Petri Nets
Periodic data retrieval problem in rings containing a malicious host
SIROCCO'10 Proceedings of the 17th international conference on Structural Information and Communication Complexity
Research note: Security issues related to mobile code and agent-based systems
Computer Communications
Security Issues in Mobile Agent Applications
International Journal of Agent Technologies and Systems
Searching for a black hole in interconnected networks using mobile agents and tokens
Journal of Parallel and Distributed Computing
Hi-index | 0.01 |
In mobile code systems, programs or processes travel from host to host in order to accomplish their goals. Such systems violate some of the assumptions that underlie most existing computer security implementations. In order to make these new systems secure, we will have to deal with a number of issues that previous systems have been able to ignore or sidestep. This paper surveys the assumptions that mobile code systems violate (including the identification of programs with persons, and other assumptions that follow from that), the new security issues that arise, and some of the ways that these issues will be addressed.