Mobility and Remote-Code Execution
نویسنده
چکیده
Using an adapted analysis grid, this paper presents a new reading of the concepts underlying the mobile code/agent technology by proposing a decomposition of the paradigms related to remote-code execution into three categories: remote-code calling, remote code-loading and mobile code. Models resulting from this decomposition are specified and implemented using a uniform execution system. A distinction between mobile code and mobile software agent is then proposed.
منابع مشابه
Cryptographic Traces for Mobile Agents
Mobile code systems are technologies that allow applications to move their code, and possibly the corresponding state, among the nodes of a wide-area network. Code mobility is a exible and powerful mechanism that can be exploited to build distributed applications in an Internet scale. At the same time, the ability to move code to and from remote hosts introduces serious security issues. These i...
متن کاملUsing Mobile Code to Control Native Execution of Distributed Unix ?
This paper presents MOS, a hybrid mobile/native code architecture where interpreted mobile code (messengers expressed in the MM language) is used to control the execution of native code. This results in the mobile code interpreters becoming microkernels. Interpreted messengers are responsible for resource allocation in the network i.e., they are the glue between remote nodes, while CPU intensiv...
متن کاملSecrecy in Mobile Code
Mobile code is code that can be executed at a remote location, where beforehand it might not be known whether this location is trustworthy and a requirement may be that the to be executed code is encrypted and remains encrypted during execution. This paper presents a model of mobile code and defines perfect secrecy. The model and definition allows to derive conditions and theoretical boundaries...
متن کاملSecure Execution of Mobile Java using Static Analysis and Proof Carrying Code
We consider the problems raised by the use of mobile code in e-Science. If a user submits a program for execution on a remote machine then problems can arise if the program misbehaves, for example by using too much memory or taking too long to execute. We describe methods which can be used to obtain unforgeable a priori guarantees that a mobile program will behave in a reasonable manner. We hav...
متن کاملSoftware Tampering Detection using AOP and mobile code
Assuring that a given code is faithfully executed with defined parameters and constraints on an un-trusted host is an open problem, which is especially important in the context of computing over communications networks. This work evaluates applicability of Aspect-Oriented Programming (AOP) to the problem of remotely authenticating code during execution, which aims at assuring that the software ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009