Secrecy in Mobile Code

نویسندگان

  • K. Cartrysse
  • J.C.A. van der Lubbe
چکیده

Mobile code is code that can be executed at a remote location, where beforehand it might not be known whether this location is trustworthy and a requirement may be that the to be executed code is encrypted and remains encrypted during execution. This paper presents a model of mobile code and defines perfect secrecy. The model and definition allows to derive conditions and theoretical boundaries for protection of mobile code.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secrecy for Mobile Implementations of Security Protocols

Giambiagi, P. 2001: Secrecy for Mobile Implementations of Security Protocols. TRITA-IT AVH 01:05, Department of Microelectronics and Information Technology, Stockholm.ISSN 1403-5286. Mobile code technology offers interesting possibilities to the practitioner, but also raises strong concerns about security. One aspect of security is secrecy, the preservation of confidential information. This the...

متن کامل

RFID Authentication with Un-Traceability and Forward Secrecy in the Partial-Distributed-Server Model

Secure authentication of low cost Radio Frequency Identification (RFID) tag with limited resources is a big challenge, especially when we simultaneously consider anonymity, un-traceability, and forward secrecy. The popularity of Internet of Things (IoT) further amplifies this challenge, as we should authenticate these mobile tags in the partialdistributed-server environments. In this paper, we ...

متن کامل

Channel Dependent Types for Higher-Order Mobile Processes (Part I)

We introduce a new expressive theory of types for the higher-order π-calculus which significantly improves our previous work presented in [65] by the use of channel dependent/existential types. New dependent types control dynamic change of process accessibility via channel passing, while existential types guarantee safe scope-extrusion in higher-order process passing. This solves an open issue ...

متن کامل

Secure Communications over Arbitrarily Varying

by Ebrahim MolavianJazi In this thesis, we consider a class of information protection problems requiring confidentiality (secrecy) from eavesdropping and integrity (reliability) from jamming in an information-theoretic context. For this purpose, we introduce the arbitrarily varying wire-tap channel (AVWTC) model consisting of a family of wiretap channels indexed by some state that is selected b...

متن کامل

Protecting Integrity and Secrecy of Mobile Agents on Trusted and Non-Trusted Agent Places

Mobile Software Agents are at the mercy of the agent places they visit on their itinerary. But certain applications have a need for protection of secrecy and integrity of parts of the mobile agents data space. In this paper I will introduce a definition of the term Mobile Software Agent that is derived from a general definition of the term agent and the definition of Wooldridge and Jennings in ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004