[go: up one dir, main page]

Puliafito et al., 2002 - Google Patents

Design and development of a practical security model for a mobile agent system

Puliafito et al., 2002

View PDF
Document ID
4338848762480455768
Author
Puliafito A
Tomarchio O
Publication year
Publication venue
Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications

External Links

Snippet

Since its appearance, mobile agent technology has been considered as a new and flexible paradigm for distributed application development. However because of code mobility, this paradigm produces new threats to security too, which are of central importance when …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)

Similar Documents

Publication Publication Date Title
US9665708B2 (en) Secure system for allowing the execution of authorized computer program code
Hohl Time limited blackbox security: Protecting mobile agents from malicious hosts
US7228434B2 (en) Method of protecting the integrity of a computer program
KR100463736B1 (en) Method for permitting debugging and testing of software on mobile communication device in a secure environment
KR101335133B1 (en) Posture-based data protection
JP4463887B2 (en) Protected storage of core data secrets
US20060143700A1 (en) Security System Providing Methodology for Cooperative Enforcement of Security Policies During SSL Sessions
Karnik et al. A security architecture for mobile agents in Ajanta
WO2003038579A1 (en) Enhanced quality of identification in a data communications network
WO2003038575A2 (en) Portability and privacy with data communications network browsing
JP2001077858A (en) Communication network managing method, mobile agent movement managing method, and communication network
US20090204544A1 (en) Activation by trust delegation
Puliafito et al. Design and development of a practical security model for a mobile agent system
GB2312767A (en) Protected persistent storage access by applets
Nagaratnam et al. Resource access control for an internet user agent
Navarro et al. Role-based access control for e-commerce sea-of-data applications
Jensen et al. Policy expression and enforcement for handheld devices
Hartig et al. Encapsulating mobile objects
Huda et al. Privacy protection in mobile agent based service domain
Varadharajan Distributed object systems security
CN118965335A (en) Object storage system authentication method for client and device, medium, equipment
Piessens Developing Secure Software Applications DRAFT
Alawneh Mitigating the risk of insider threats when sharing credentials.
Turner et al. The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments Peter A. Loscocco, Stephen D. Smalley, Patrick A. Muckelbauer, Ruth C. Taylor
Hohl Agents From Malicious Hosts¹