Bidirectional mobile code trust management using tamper resistant hardware

  • Authors:
  • John Zachary;Richard Brooks

  • Affiliations:
  • Department of Computer Science and Engineering, University of South Carolina, Columbia, SC;Department of Computer Science and Engineering, University of South Carolina, Columbia, SC

  • Venue:
  • Mobile Networks and Applications - Security in mobile computing environments
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

Trust management in a networked environment consists of authentication and integrity checking. In a mobile computing environment, both remote hosts and mobile code are suspect. We present a model that addresses trust negotiation between the remote host and the mobile code simultaneously. Our model uses tamper resistant hardware, public key cryptography, and one-way hash functions.