Mobile code paradigms and security issues

作者: R. Brooks

DOI: 10.1109/MIC.2004.1297274

关键词:

摘要: Programs are no longer constrained to execute on the nodes where they reside, and many systems therefore support code mobility. Although mobile has yet fully realize its promise of increased system flexibility, scalability, reliability, marketplace embraced implementations such as Java.Jini, PostScript, .NET. Several paradigms exist, use raises security concerns. Here, we map a taxonomy network vulnerabilities, revealing that important issues being ignored.

参考文章(12)
Wayne Jansen, Tom Karygiannis, Mobile Agent Security National Institute of Standards and Technology (U.S.). ,(1999) , 10.6028/NIST.SP.800-19
Athanasios T. Karygiannis, Wayne Jansen, SP 800-19. Mobile Agent Security National Institute of Standards & Technology. ,(1999)
John D. Howard, Thomas A Longstaff, A common language for computer security incidents United States. National Technical Information Service. ,(1998) , 10.2172/751004
T. Sander, C.F. Tschudin, Towards mobile cryptography ieee symposium on security and privacy. pp. 215- 224 ,(1998) , 10.1109/SECPRI.1998.674837
Sergio Loureiro, Mobile code protection with Smartcards Springer. ,(2000)
J. Zachary, Protecting mobile code in the world IEEE Internet Computing. ,vol. 7, pp. 78- 82 ,(2003) , 10.1109/MIC.2003.1189192
D. Wu, D. Agrawal, A. El Abbadi, StratOSphere: unification of code, data, location, scope, and mobility international symposium on distributed objects and applications. pp. 12- 23 ,(1999) , 10.1109/DOA.1999.793973
A. Fuggetta, G.P. Picco, G. Vigna, Understanding code mobility IEEE Transactions on Software Engineering. ,vol. 24, pp. 342- 361 ,(1998) , 10.1109/32.685258
A.D. Rubin, D.E. Geer, Mobile code security IEEE Internet Computing. ,vol. 2, pp. 30- 34 ,(1998) , 10.1109/4236.735984