Mobile Code and Security Issues

Over the years computer systems have evolved from centralized monolithic computing devices supporting static applications, into client-server environments that allow complex forms of distributed computing. Throughout this evolution limited forms of code mobility have existed. The explosion in the use of the World Wide Web coupled with the rapid evolution of the platform independent programming languages has promoted the use of mobile code and at the same time raised some important security issues. This chapter introduces mobile code technology and discusses the related security issues. The first part of the chapter deals with the need for mobile codes and the various methods of categorizing them. One method of categorising the mobile code is based on code mobility. Different forms of code mobility like code on demand, remote evaluation and mobile agents are explained in detail. The other method is based on the type of code distributed. Various types of codes like Source Code, Intermediate Code, Platform-dependent Binary Code, Just-in-Time Compilation are explained. Mobile agents, as autonomously migrating software entities, present great challenges to the design and implementation of security mechanisms. The second part of this chapter deals with the security issues. These issues are broadly divided into code related issues and host related issues. Techniques like Sandboxing, Code signing and Proof carrying code are widely applied to protect the hosts. Execution tracing, Mobile cryptography, Obfuscated code, Co-Operating Agents are used to protect the code from harmful agents. The security mechanisms like language support for safety, OS level security and safety policies are discussed in the last section. In order to make the mobile code approach practical, it is essential to understand mobile code technology. Advanced and innovative solutions are to be developed to restrict the operations that mobile code can perform but without unduly restricting its functionality. It is also necessary to develop formal, extremely easy to use safety measures.

[1]  Vincent Homburg A Comparative Account of Joined-Up Government Initiatives in Dutch and Belgian Social Security , 2007 .

[2]  Nirvikar Singh Encyclopedia of E-Business Development and Management in the Global Economy , 2010 .

[3]  Halim Sayoud,et al.  Automatic Speaker Localization and Tracking: Using a Fusion of the Filtered Correlation with the Energy Differential , 2010, Int. J. Mob. Comput. Multim. Commun..

[4]  David Taniar,et al.  International Journal of Mobile Computing and Multimedia Communications , 2010 .

[5]  Soumaya Ben Letaifa A New Conceptual Framework for Greater Success with Integration of E-CRM , 2009 .

[6]  Frank G. Goethals,et al.  Editorial Preface : International Journal of E-Business Research , 2022 .

[7]  Gottfried Vossen,et al.  Secure Identity Management in a Service-Based E-Learning Environment , 2006, Int. J. Intell. Inf. Technol..

[8]  Mehdi Khosrow-Pour,et al.  The Social and Cognitive Impacts of E-Commerce on Modern Organizations , 2003 .

[9]  Barbara L. Ciaramitaro Mobile Technology Consumption: Opportunities and Challenges , 2011 .

[10]  David Taniar Encyclopedia of Mobile Computing and Commerce , 2007 .

[11]  Mehdi Khosrow-Pour,et al.  Encyclopedia of E-commerce, E-government and Mobile Commerce , 2006 .

[12]  Ali Asghar Pourezzat,et al.  Professional Adhocracy, an Appropriate Design for Knowledge Economy in the Light of Mintzberg's Perspective , 2009, J. Electron. Commer. Organ..

[13]  Annie Becker,et al.  Electronic Commerce: Concepts, Methodologies, Tools and Applications , 2007 .

[14]  Fernando Alonso,et al.  Enterprise 2.0: Collaboration and Knowledge Emergence as a Business Web Strategy Enabler , 2008 .

[15]  Danny B. Lange,et al.  A Security Model for Aglets , 1997, IEEE Internet Comput..

[16]  Ko de Ruyter,et al.  Multi-Channel Retailing and Customer Satisfaction: Implications for E-CRM , 2007, Int. J. E Bus. Res..

[18]  John M. Carroll,et al.  Game-Based Methodology for Collaborative Mobile Applications , 2007 .

[19]  David Taniar Mobile Computing: Concepts, Methodologies, Tools, and Applications , 2008 .

[20]  Hubert Österle,et al.  Implementing Collaborative Process Management: The Case of Net-Tech , 2005 .

[21]  Christopher S. Wright,et al.  Socio-Economic Differences and Deployment of the LDC Micro-Finance Bottom-up Approach in DCs , 2010, J. Electron. Commer. Organ..

[22]  T. Foster Aktivitet: Journal of Electronic Commerce in Organizations , 2003 .

[23]  In Lee,et al.  Emergent Strategies for E-Business Processes, Services and Implications: Advancing Corporate Frameworks , 2008 .

[24]  Jianliang Xu Mobile Caching for Location-Based Services , 2006 .

[25]  Vladimir Tosic,et al.  Extending Apache Axis for monitoring of Web Service Offerings , 2005 .

[26]  Gordon W. Skelton,et al.  Mobile Commerce Application Development , 2005 .