IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Security of Mobile Code

Security of Mobile Code
View Sample PDF
Author(s): Zbigniew Kotulski (Polish Academy of Sciences, Warsaw, Poland and Warsaw University of Technology, Poland) and Aneta Zwierko (Warsaw University of Technology, Poland)
Copyright: 2008
Pages: 16
Source title: Handbook of Research on Wireless Security
Source Author(s)/Editor(s): Yan Zhang (Simula Research Laboratory, Norway), Jun Zheng (City University of New York, USA) and Miao Ma (National Institute of Information & Communications Tech, Singapore)
DOI: 10.4018/978-1-59904-899-4.ch003

Purchase

View Security of Mobile Code on the publisher's website for pricing and purchasing information.

Abstract

The recent development in the mobile technology (mobile phones, middleware, wireless networks, etc.) created a need for new methods of protecting the code transmitted through the network. The oldest and the simplest mechanisms concentrate more on integrity of the code itself and on the detection of unauthorized manipulation. The newer solutions not only secure the compiled program, but also the data, that can be gathered during its “journey,” and even the execution state. Some other approaches are based on prevention rather than detection. In this chapter we present a new idea of securing mobile agents. The proposed method protects all components of an agent: the code, the data, and the execution state. The proposal is based on a zero-knowledge proof system and a secure secret sharing scheme, two powerful cryptographic primitives. Next, the chapter includes security analysis of the new method and its comparison to other currently more widespread solutions. Finally, we propose a new direction of securing mobile agents by straightening the methods of protecting integrity of the mobile code with risk analysis and a reputation system that helps avoiding a high-risk behavior.

Related Content

Michael Robinson, Kevin Jones. © 2020. 23 pages.
P. Lalitha Surya Kumari. © 2020. 42 pages.
Xichen Zhang, Ali A. Ghorbani. © 2020. 31 pages.
Dharmpal Singh, Ira Nath, Pawan Kumar Singh. © 2020. 28 pages.
Brian Tuan Khieu, Melody Moh. © 2020. 16 pages.
Prabha Selvaraj, Sumathi Doraikannan, Vijay Kumar Burugari. © 2020. 27 pages.
Mohammad Rasool Fatemi, Ali A. Ghorbani. © 2020. 21 pages.
Body Bottom