Certificates for Mobile Code Security
Certificates for Mobile Code Security
The problem of protecting mobile code from malicious hosts is an important security issue, for which many solutions have been proposed. We describe a method to adapt an existing technique, execution tracing, to enhance its flexibility in deployment for a large scale mobile agent system. This is achieved through the introduction of a trusted third party, the verification server, which undertakes the verification of execution traces on behalf of the platform launching the agent. The server constructs a certificate that testifies to the capability of a particular host platform to undertake the correct execution of a mobile agent. In this sense, the server assumes a role analogous of a Certificate Authority (CA) in a PKI. We briefly discuss the issues associated with such a framework.
1-58113-445-2
76-81
Tan, Hock Kim
fbafc283-5abf-4b64-8135-3295216bbd4e
Moreau, Luc
033c63dd-3fe9-4040-849f-dfccbe0406f8
March 2002
Tan, Hock Kim
fbafc283-5abf-4b64-8135-3295216bbd4e
Moreau, Luc
033c63dd-3fe9-4040-849f-dfccbe0406f8
Tan, Hock Kim and Moreau, Luc
(2002)
Certificates for Mobile Code Security.
The 17th ACM Symposium on Applied Computing (SAC'2002) --- Track on Agents, Interactions, Mobility and Systems.
.
Record type:
Conference or Workshop Item
(Paper)
Abstract
The problem of protecting mobile code from malicious hosts is an important security issue, for which many solutions have been proposed. We describe a method to adapt an existing technique, execution tracing, to enhance its flexibility in deployment for a large scale mobile agent system. This is achieved through the introduction of a trusted third party, the verification server, which undertakes the verification of execution traces on behalf of the platform launching the agent. The server constructs a certificate that testifies to the capability of a particular host platform to undertake the correct execution of a mobile agent. In this sense, the server assumes a role analogous of a Certificate Authority (CA) in a PKI. We briefly discuss the issues associated with such a framework.
Text
sac02b
- Accepted Manuscript
More information
Published date: March 2002
Additional Information:
Event Dates: March 2002
Venue - Dates:
The 17th ACM Symposium on Applied Computing (SAC'2002) --- Track on Agents, Interactions, Mobility and Systems, 2002-03-01
Organisations:
Web & Internet Science
Identifiers
Local EPrints ID: 256400
URI: http://eprints.soton.ac.uk/id/eprint/256400
ISBN: 1-58113-445-2
PURE UUID: cea2554b-b670-4530-8cf8-bcf499f91cce
Catalogue record
Date deposited: 22 Mar 2002
Last modified: 14 Mar 2024 05:42
Export record
Contributors
Author:
Hock Kim Tan
Author:
Luc Moreau
Download statistics
Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.
View more statistics