<p>New paradigms can popularize old technologies. A new \standalone" paradigm, the electronic desktop, popularized the personal computer. A new \connected" paradigm, the web browser, popularized the Internet. Another new paradigm, the mobile agent, may further popularize the Internet by giving peopl
Mobile Agents and Security
β Scribed by David M. Chess (auth.), Giovanni Vigna (eds.)
- Publisher
- Springer-Verlag Berlin Heidelberg
- Year
- 1998
- Tongue
- English
- Leaves
- 268
- Series
- Lecture Notes in Computer Science 1419
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
New paradigms can popularize old technologies. A new \standalone" paradigm, the electronic desktop, popularized the personal computer. A new \connected" paradigm, the web browser, popularized the Internet. Another new paradigm, the mobile agent, may further popularize the Internet by giving people greater access to it with less eort. MobileAgentParadigm The mobile agent paradigm integrates a network of computers in a novel way designed to simplify the development of network applications. To an application developer the computers appear to form an electronic world of places occupied by agents. Each agent or place in the electronic world has the authority of an individual or an organization in the physical world. The authority can be established, for example, cryptographically. A mobile agent can travel from one place to another subject to the des- nation placeβs approval. The source and destination places can be in the same computer or in di erent computers. In either case,the agentinitiates the trip by executing a \go" instruction which takes as an argument the name or address of the destination place. The next instruction in the agentβs program is executed in the destination place, rather than in the source place. Thus, in a sense, the mobile agent paradigm reduces networking to a program instruction. A mobile agent can interact programmatically with the places it visits and, if the other agents approve, with the other agents it encounters in those places.
β¦ Table of Contents
Security Issues in Mobile Code Systems....Pages 1-14
Environmental Key Generation Towards Clueless Agents....Pages 15-24
Language Issues in Mobile Program Security....Pages 25-43
Protecting Mobile Agents Against Malicious Hosts....Pages 44-60
Safe, Untrusted Agents Using Proof-Carrying Code....Pages 61-91
Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts....Pages 92-113
Authentication for Mobile Agents....Pages 114-136
Cryptographic Traces for Mobile Agents....Pages 137-153
DβAgents: Security in a Multiple-Language, Mobile-Agent System....Pages 154-187
A Security Model for Aglets....Pages 188-205
Signing, Sealing, and Guarding Javaβ’ Objects....Pages 206-216
The Safe-Tcl Security Model....Pages 217-234
Web Browsers and Security....Pages 235-256
β¦ Subjects
Data Encryption; Operating Systems; Computer Communication Networks; Artificial Intelligence (incl. Robotics); Management of Computing and Information Systems
π SIMILAR VOLUMES
A mobile agent system could be attacked by malicious agents, platforms and third parties. Mobile agents simply offer greater opportunities for abuse and misuse, which broadens the scale of threats significantly. In addition, since mobile agents have some unique characteristics such as their mobility
A mobile agent system could be attacked by malicious agents, platforms and third parties. Mobile agents simply offer greater opportunities for abuse and misuse, which broadens the scale of threats significantly. In addition, since mobile agents have some unique characteristics such as their mobility
<span>Recent years have witnessed the appearance of new paradigms for designing distributed applications where the application components can be relocated - namically across the hosts of the network. This form of code mobility lays the foundation for a new generation of technologies, architectures,
<P>NTMSΠ²Πβ’2007 is the first IFIP International Conference on New Technologies, Mobility and Security thatΠΒ was held from May 2 to May 4, 2007 in Paris, France.</P> <P>NTMS'2007 aims at fostering advances in the areas of New Technologies, Wireless Networks, Mobile Computing, Ad hoc and Ambient Netwo
Wireless and mobile networks have undergone a tremendous evolution since their start. This was mainly motivated by the need for connectivity everywhere, as exemplified by the philosophy of "always on" access. Mobile telephony was the first need felt by users, followed by the need for mobile Internet