1998
DOI: 10.1007/3-540-68671-1_4
|View full text |Cite
|
Sign up to set email alerts
|

Protecting Mobile Agents Against Malicious Hosts

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
211
0
5

Year Published

2002
2002
2015
2015

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 416 publications
(216 citation statements)
references
References 7 publications
0
211
0
5
Order By: Relevance
“…Among the severe security threats faced in systems supporting mobile agents, a particularly troublesome one is a harmful host; that is, the presence at a network site of harmful stationary processes. The problem posed by the presence of a harmful host has been intensively studied from a programming point of view (e.g., see [12,16,18]), and recently also from an algorithmic prospective [8,9]. Obviously, the first step in any solution to such a problem must be to identify, if possible, the harmful host; i.e., to determine and report its location.…”
Section: Introductionmentioning
confidence: 99%
“…Among the severe security threats faced in systems supporting mobile agents, a particularly troublesome one is a harmful host; that is, the presence at a network site of harmful stationary processes. The problem posed by the presence of a harmful host has been intensively studied from a programming point of view (e.g., see [12,16,18]), and recently also from an algorithmic prospective [8,9]. Obviously, the first step in any solution to such a problem must be to identify, if possible, the harmful host; i.e., to determine and report its location.…”
Section: Introductionmentioning
confidence: 99%
“…Pure software methods for confidentiality have CEF [19], black box security [20], environment-key [21], etc.…”
Section: F Computation Securitymentioning
confidence: 99%
“…The use of encrypted programs [4] is proposed as the only way to give privacy and integrity to mobile code. Hosts execute the encrypted code directly.…”
Section: Attack Avoidance Approachesmentioning
confidence: 99%