Share Email Print

Proceedings Paper

Mobile code security
Author(s): Srikumar Ramalingam
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

A highly secure mobile agent system is very important for a mobile computing environment. The security issues in mobile agent system comprise protecting mobile hosts from malicious agents, protecting agents from other malicious agents, protecting hosts from other malicious hosts and protecting agents from malicious hosts. Using traditional security mechanisms the first three security problems can be solved. Apart from using trusted hardware, very few approaches exist to protect mobile code from malicious hosts. Some of the approaches to solve this problem are the use of trusted computing, computing with encrypted function, steganography, cryptographic traces, Seal Calculas, etc. This paper focuses on the simulation of some of these existing techniques in the designed mobile language. Some new approaches to solve malicious network problem and agent tampering problem are developed using public key encryption system and steganographic concepts. The approaches are based on encrypting and hiding the partial solutions of the mobile agents. The partial results are stored and the address of the storage is destroyed as the agent moves from one host to another host. This allows only the originator to make use of the partial results. Through these approaches some of the existing problems are solved.

Paper Details

Date Published: 8 November 2001
PDF: 8 pages
Proc. SPIE 4534, Optoelectronic and Wireless Data Management, Processing, Storage, and Retrieval, (8 November 2001); doi: 10.1117/12.448024
Show Author Affiliations
Srikumar Ramalingam, Anna Univ. (United States)

Published in SPIE Proceedings Vol. 4534:
Optoelectronic and Wireless Data Management, Processing, Storage, and Retrieval
Robert Raymond; Pradip K. Srimani; Renjeng Su; Carl W. Wilmsen, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?