Talk With an Expert

Security Techniques for Mobile Code

Security Techniques for Mobile Code (PDF, 1.95MB)Published: 11 Jul, 2002
Created by:
Nathan Macrides

From a security point of view mobile code entities extend the potential of (stationary) distributed systems through the possibility of programs being executed on computers that are often not maintained by the employer of that program. Here two parties are involved in running a program, and thus guarantees have to be given that one party will not harm the other. This paper discusses the various techniques and trust models needed to enforce a level of security that prevents malicious mobile code from infiltrating and running on an unsuspecting users system.