IEEE Transactions on Software Engineering
Mobility: processes, computers, and agents
Mobility: processes, computers, and agents
Security in the Ajanta mobile agent system
Software—Practice & Experience
Portable resource control in Java
OOPSLA '01 Proceedings of the 16th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
Secure mobile agent systems using Java: where are we heading?
Proceedings of the 2002 ACM symposium on Applied computing
Mobile agents with Java: The Aglet API
World Wide Web
Globe: A Wide-Area Distributed System
IEEE Concurrency
Supporting internet-scale multi-agent systems
Data & Knowledge Engineering - DKE 40
Mobile Agents and Security
A Flexible Containment Mechanism for Executing Untrusted Code
Proceedings of the 11th USENIX Security Symposium
The Architecture of the Ara Platform for Mobile Agents
MA '97 Proceedings of the First International Workshop on Mobile Agents
Mobile Agents and Intellectual Property Protection
MA '98 Proceedings of the Second International Workshop on Mobile Agents
Transparent Migration of Java-Based Mobile Agents
MA '98 Proceedings of the Second International Workshop on Mobile Agents
Strong Mobility and Fine-Grained Resource Control in NOMADS
ASA/MA 2000 Proceedings of the Second International Symposium on Agent Systems and Applications and Fourth International Symposium on Mobile Agents
Bytecode Transformation for Portable Thread Migration in Java
ASA/MA 2000 Proceedings of the Second International Symposium on Agent Systems and Applications and Fourth International Symposium on Mobile Agents
A Security Architecture for Object-Based Distributed Systems
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
The LOCUS distributed operating system
SOSP '83 Proceedings of the ninth ACM symposium on Operating systems principles
Operating system support for mobile agents
HOTOS '95 Proceedings of the Fifth Workshop on Hot Topics in Operating Systems (HotOS-V)
Concepts and Architecture of a Security-Centric Mobile Agent Server
ISADS '01 Proceedings of the Fifth International Symposium on Autonomous Decentralized Systems
A distributed content-based search engine based on mobile code
Proceedings of the 2005 ACM symposium on Applied computing
Processes in KaffeOS: isolation, resource management, and sharing in java
OSDI'00 Proceedings of the 4th conference on Symposium on Operating System Design & Implementation - Volume 4
Improving host security with system call policies
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
A secure environment for untrusted helper applications confining the Wily Hacker
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Flexible and efficient sandboxing based on fine-grained protection domains
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
CORBA: integrating diverse applications within distributed heterogeneous environments
IEEE Communications Magazine
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Hi-index | 0.00 |
Mobile code and mobile agents are generally associated with security vulnerabilities, rather than with increased security. This paper describes an approach in which mobile agents are confined, in order to allow content providers to retain control over how their data is exported while allowing agents to search the full content of this data locally. This approach offers increased control and security compared to the traditional client-server technologies commonly used for building distributed systems. We describe a new system, called Mansion, which implements confinement of mobile agents, and describe a number of applications of the confinement model to illustrate its potential.