Mobile Computations and Hostile Hosts
نویسندگان
چکیده
This paper scratches the surface of the problem of classifying the attacks that a mobile computation can be subjected to in an open network. The discussion is based on a simplified version of the Seal calculus. We show the impact of these attacks on the semantics of the calculus and on the notion of observational equivalence.
منابع مشابه
A Public-key based Information Management Model for Mobile Agents
Mobile code based computing requires development of protection schemes that allow digital signature and encryption of data collected by the agents in untrusted hosts. These algorithms could not rely on carrying encryption keys if these keys could be stolen or used to counterfeit data by hostile hosts and agents. As a consequence, both information and keys must be protected in a way that only au...
متن کاملSecure Execution of Computations in Untrusted Hosts
Proliferation of distributed computing platforms, in both small and large scales, and mobile applications makes it important to protect remote hosts (servers) from mobile applications and mobile applications from remote hosts. This paper proposes and evaluates a solution to the latter problem for applications based on linear computations that involve scalar as well as array arithmetic. We demon...
متن کاملTransaction Processing in Mobile Computing Environment
Distributed systems are expected to support mobile computations executed over a computer network of xed and mobile hosts. This paper examines the requirements for structuring such mobile computations that access shared data in a database, argues that opennesting can better facilitate these requirements, and proposes an Open-Nested Transaction model in a mobile environment using the notion of Re...
متن کاملUsing An XML Database To Coordinate Communication Between Mobile Computations On The Internet
One approach for sharing resources on the Internet is to use mobile computations (programs that can commence execution at one site, discover a need for a resource at a different site, halt execution, migrate, and continue execution at the new site). Migrating an executing process is a non-trivial task that is exacerbated by the heterogeneity and security concerns of the computing infrastructure...
متن کاملTowards a Calculus of Secure Mobile Computations
The Seal calculus is a calculus of mobile computations designed for programming secure distributed applications over large scale open networks. The calculus is a distributed variant of the-calculus that incorporates agent mobility as well as strong protection mechanisms. Linear, revocable, capabilities control access to resources and ensure that agents may only use resources that have been allo...
متن کامل