Puliafito et al., 2002 - Google Patents
Design and development of a practical security model for a mobile agent systemPuliafito et al., 2002
View PDF- Document ID
- 4338848762480455768
- Author
- Puliafito A
- Tomarchio O
- Publication year
- Publication venue
- Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications
External Links
Snippet
Since its appearance, mobile agent technology has been considered as a new and flexible paradigm for distributed application development. However because of code mobility, this paradigm produces new threats to security too, which are of central importance when …
- 238000011161 development 0 title abstract description 6
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9665708B2 (en) | Secure system for allowing the execution of authorized computer program code | |
Hohl | Time limited blackbox security: Protecting mobile agents from malicious hosts | |
US7228434B2 (en) | Method of protecting the integrity of a computer program | |
KR100463736B1 (en) | Method for permitting debugging and testing of software on mobile communication device in a secure environment | |
KR101335133B1 (en) | Posture-based data protection | |
JP4463887B2 (en) | Protected storage of core data secrets | |
US20060143700A1 (en) | Security System Providing Methodology for Cooperative Enforcement of Security Policies During SSL Sessions | |
Karnik et al. | A security architecture for mobile agents in Ajanta | |
WO2003038579A1 (en) | Enhanced quality of identification in a data communications network | |
WO2003038575A2 (en) | Portability and privacy with data communications network browsing | |
JP2001077858A (en) | Communication network managing method, mobile agent movement managing method, and communication network | |
US20090204544A1 (en) | Activation by trust delegation | |
Puliafito et al. | Design and development of a practical security model for a mobile agent system | |
GB2312767A (en) | Protected persistent storage access by applets | |
Nagaratnam et al. | Resource access control for an internet user agent | |
Navarro et al. | Role-based access control for e-commerce sea-of-data applications | |
Jensen et al. | Policy expression and enforcement for handheld devices | |
Hartig et al. | Encapsulating mobile objects | |
Huda et al. | Privacy protection in mobile agent based service domain | |
Varadharajan | Distributed object systems security | |
CN118965335A (en) | Object storage system authentication method for client and device, medium, equipment | |
Piessens | Developing Secure Software Applications DRAFT | |
Alawneh | Mitigating the risk of insider threats when sharing credentials. | |
Turner et al. | The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments Peter A. Loscocco, Stephen D. Smalley, Patrick A. Muckelbauer, Ruth C. Taylor | |
Hohl | Agents From Malicious Hosts¹ |