Inside OLE (2nd ed.)
Proceedings of the 24th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
IEEE Transactions on Software Engineering
Communications of the ACM
A note on the confinement problem
Communications of the ACM
Network Security Essentials: Applications and Standards
Network Security Essentials: Applications and Standards
Inside Windows NT
The Java Programming Language
IEEE Internet Computing
A Tutorial on CRC Computations
IEEE Micro
Research on Proof-Carrying Code for Untrusted-Code Security
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Tampering in RFID: A Survey on Risks and Defenses
Mobile Networks and Applications
Hi-index | 0.00 |
Trust management in a networked environment consists of authentication and integrity checking. In a mobile computing environment, both remote hosts and mobile code are suspect. We present a model that addresses trust negotiation between the remote host and the mobile code simultaneously. Our model uses tamper resistant hardware, public key cryptography, and one-way hash functions.