Security issues related to mobile code and agent-based systems

This article elaborates on security issues related to mobile code and agent-based systems. In particular, it addresses the problems of (a) how to protect an execution environment against potentially malicious mobile code, and (b) how to protect the mobile code against potentially malicious hosts and execution environments. The article overviews and discusses some technical approaches to address the problems. It concludes with the insight that possible solutions for the problems are not independent, and that some solutions for problem (b) make it more difficult to find appropriate solutions for problem (a).

[1]  Vipin Swarup,et al.  Authentication for Mobile Agents , 1998, Mobile Agents and Security.

[2]  George C. Necula,et al.  Safe, Untrusted Agents Using Proof-Carrying Code , 1998, Mobile Agents and Security.

[3]  Giovanni Vigna,et al.  Cryptographic Traces for Mobile Agents , 1998, Mobile Agents and Security.

[4]  Danny B. Lange,et al.  A Security Model for Aglets , 1997, IEEE Internet Comput..

[5]  David M. Chess,et al.  Security Issues in Mobile Code Systems , 1998, Mobile Agents and Security.

[6]  Carlo Ghezzi,et al.  Analyzing Mobile Code Languages , 1996, Mobile Object Systems.

[7]  Scott Oaks,et al.  Java Security , 1998 .

[8]  Fritz Hohl,et al.  Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts , 1998, Mobile Agents and Security.

[9]  Ken Thompson,et al.  Reflections on trusting trust , 1984, CACM.

[10]  Christian F. Tschudin,et al.  Towards mobile cryptography , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).

[11]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[12]  Martín Abadi,et al.  Authentication in distributed systems: theory and practice , 1991, SOSP '91.

[13]  John K. Ousterhout,et al.  The Safe-Tcl Security Model , 1998, USENIX Annual Technical Conference.

[14]  Geoffrey Smith,et al.  Language Issues in Mobile Program Security , 1998, Mobile Agents and Security.

[15]  Christian F. Tschudin,et al.  Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.

[16]  Danny B. Lange,et al.  Programming and Deploying Java¿ Mobile Agents with Aglets¿ , 1998 .

[17]  George Cybenko,et al.  D'Agents: Security in a Multiple-Language, Mobile-Agent System , 1998, Mobile Agents and Security.