Security Issues in Mobile Code Systems

In mobile code systems, programs or processes travel from host to host in order to accomplish their goals. Such systems violate some of the assumptions that underlie most existing computer security implementations. In order to make these new systems secure, we will have to deal with a number of issues that previous systems have been able to ignore or sidestep. This paper surveys the assumptions that mobile code systems violate (including the identification of programs with persons, and other assumptions that follow from that), the new security issues that arise, and some of the ways that these issues will be addressed.

[1]  Ehud Shapiro,et al.  Active mail—a framework for implementing groupware , 1992, CSCW '92.

[2]  Aaron Kershenbaum,et al.  Mobile Agents: Are They a Good Idea? , 1996, Mobile Object Systems.

[3]  Benedict G. E. Wiedemann Protection? , 1998, Science.

[4]  B. Lampson,et al.  Authentication in distributed systems: theory and practice , 1991, TOCS.

[5]  Esther H. Highland Computer systems under siege , 1988 .

[6]  A. Retrospective,et al.  The UNIX Time-sharing System , 1977 .

[7]  Eugene H. Spafford,et al.  The internet worm program: an analysis , 1989, CCRV.

[8]  Aaron Kershenbaum,et al.  Mobile agents: Are they a good idea? — update , 1996 .

[9]  Andrew P. Black,et al.  Fine-grained mobility in the Emerald system , 1987, TOCS.

[10]  Radia J. Perlman,et al.  Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.

[11]  Kazuya Kosaka,et al.  Aglets: Programming Mobile Agents in Java , 1997, WWCA.

[12]  Danny B. Lange,et al.  Programming Mobile Agents in Java with the Java Aglet API , 1997 .

[13]  Udi Manber Chain reactions in networks , 1990, Computer.

[14]  C. Stoll The Cuckoo's Egg : Tracking a Spy Through the Maze of Computer Espionage , 1990 .

[15]  Carl E. Landwehr,et al.  Formal Models for Computer Security , 1981, CSUR.

[16]  Fritz Hohl An Approach to Solve the Problem of Malicious Hosts , 1998 .

[17]  Andrew P. Black,et al.  The Eden System: A Technical Review , 1985, IEEE Transactions on Software Engineering.

[18]  Luca Cardelli,et al.  Obliq, a language with distributed scope , 1996 .

[19]  Ken Arnold,et al.  The Java Programming Language , 1996 .

[20]  Christian F. Tschudin,et al.  Towards mobile cryptography , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).

[21]  Joann J. Ordille,et al.  When agents roam, who can you trust? , 1996, Proceedings of COM'96. First Annual Conference on Emerging Technologies and Applications in Communications.

[22]  Dan S. Wallach,et al.  Extensible security architectures for Java , 1997, SOSP.

[23]  Simson L. Garfinkel,et al.  Practical UNIX and Internet Security , 1996 .

[24]  B. Clifford Neuman,et al.  Endorsements, licensing, and insurance for distributed system services , 1994, CCS '94.

[25]  Nathaniel S. Borenstein,et al.  EMail With A Mind of Its Own: The Safe-Tcl Language for Enabled Mail , 1994, ULPAA.

[26]  Robert S. Gray,et al.  Agent Tcl: a Exible and Secure Mobile-agent System , 1996 .

[27]  Fred Douglis,et al.  Process Migration in the Sprite Operating System , 1987, ICDCS.