Bidirectional mobile code trust management using tamper resistant hardware

作者: John Zachary , Richard Brooks

DOI: 10.1023/A:1022281014117

关键词:

摘要: Trust management in a networked environment consists of authentication and integrity checking. In mobile computing environment, both remote hosts code are suspect. We present model that addresses trust negotiation between the host simultaneously. Our uses tamper resistant hardware, public key cryptography, one-way hash functions.

参考文章(20)
Ken Arnold, James Gosling, The Java programming language (2nd ed.) The Java programming language (2nd ed.). pp. 442- 442 ,(1998)
Kraig Brockschmidt, Inside OLE (2nd ed.) Microsoft Press. ,(1995)
Bennet S. Yee, Using Secure Coprocessors ,(1994)
Howard Shrobe, Jon Doyle, None, Active trust management for autonomous adaptive survivable systems (ATM's for AAss's) IWSAS' 2000 Proceedings of the first international workshop on Self-adaptive software. pp. 40- 49 ,(2000) , 10.1007/3-540-44584-6_4
James Gosling, David Colin Holmes, Ken Arnold, None, The Java Programming Language ,(1996)
Bart De Decker, Frank Piessens, Erik Van Hoeymissen, Gregory Neven, Semi-trusted Hosts and Mobile Agents: Enabling Secure Distributed Computations Lecture Notes in Computer Science. ,vol. 1931, pp. 219- 232 ,(2000) , 10.1007/3-540-45391-1_18
Helen Custer, David A. Solomon, Inside Windows NT ,(1992)
T. Sander, C.F. Tschudin, Towards mobile cryptography ieee symposium on security and privacy. pp. 215- 224 ,(1998) , 10.1109/SECPRI.1998.674837
Sergio Loureiro, Mobile code protection with Smartcards Springer. ,(2000)