Javascript must be enabled to continue!
Mobile Code and Security Issues
View through CrossRef
Over the years, computer systems have evolved from centralized monolithic computing devices supporting static applications, into client-server environments that allow complex forms of distributed computing. Throughout this evolution, limited forms of code mobility have existed. The explosion in the use of the World Wide Web, coupled with the rapid evolution of the platform- independent programming languages, has promoted the use of mobile code and, at the same time, raised some important security issues. This chapter introduces mobile code technology and discusses the related security issues. The first part of the chapter deals with the need for mobile codes and the various methods of categorising them. One method of categorising the mobile code is based on code mobility. Different forms of code mobility, like code on demand, remote evaluation, and mobile agents, are explained in detail. The other method is based on the type of code distributed. Various types of codes, like source code, intermediate code, platform-dependent binary code, and just-in-time compilation, are explained. Mobile agents, as autonomously migrating software entities, present great challenges to the design and implementation of security mechanisms. The second part of this chapter deals with the security issues. These issues are broadly divided into code-related issues and host-related issues. Techniques, like sandboxing, code signing, and proof-carrying code, are widely applied to protect the hosts. Execution tracing, mobile cryptography, obfuscated code, and cooperating agents are used to protect the code from harmful agents. The security mechanisms, like language support for safety, OS level security, and safety policies, are discussed in the last section. In order to make the mobile code approach practical, it is essential to understand mobile code technology. Advanced and innovative solutions are to be developed to restrict the operations that mobile code can perform, but without unduly restricting its functionality. It is also necessary to develop formal, extremely easy-to-use safety measures.
Title: Mobile Code and Security Issues
Description:
Over the years, computer systems have evolved from centralized monolithic computing devices supporting static applications, into client-server environments that allow complex forms of distributed computing.
Throughout this evolution, limited forms of code mobility have existed.
The explosion in the use of the World Wide Web, coupled with the rapid evolution of the platform- independent programming languages, has promoted the use of mobile code and, at the same time, raised some important security issues.
This chapter introduces mobile code technology and discusses the related security issues.
The first part of the chapter deals with the need for mobile codes and the various methods of categorising them.
One method of categorising the mobile code is based on code mobility.
Different forms of code mobility, like code on demand, remote evaluation, and mobile agents, are explained in detail.
The other method is based on the type of code distributed.
Various types of codes, like source code, intermediate code, platform-dependent binary code, and just-in-time compilation, are explained.
Mobile agents, as autonomously migrating software entities, present great challenges to the design and implementation of security mechanisms.
The second part of this chapter deals with the security issues.
These issues are broadly divided into code-related issues and host-related issues.
Techniques, like sandboxing, code signing, and proof-carrying code, are widely applied to protect the hosts.
Execution tracing, mobile cryptography, obfuscated code, and cooperating agents are used to protect the code from harmful agents.
The security mechanisms, like language support for safety, OS level security, and safety policies, are discussed in the last section.
In order to make the mobile code approach practical, it is essential to understand mobile code technology.
Advanced and innovative solutions are to be developed to restrict the operations that mobile code can perform, but without unduly restricting its functionality.
It is also necessary to develop formal, extremely easy-to-use safety measures.
Related Results
ESSENTIAL SECURITY PRACTICES FOR FORTIFYING MOBILE APPS
ESSENTIAL SECURITY PRACTICES FOR FORTIFYING MOBILE APPS
“Essential Security Practices for Fortifying Mobile Apps” is a definitive guide designed to empower developers, security professionals, and organizations with the knowledge and too...
Mobile Code and Security Issues
Mobile Code and Security Issues
Over the years computer systems have evolved from centralized monolithic computing devices supporting static applications, into client-server environments that allow complex forms ...
Mobile Code and Security Issues
Mobile Code and Security Issues
Over the years, computer systems have evolved from centralized monolithic computing devices supporting static applications, into client-server environments that allow complex forms...
Mobile Code and Security Issues
Mobile Code and Security Issues
Over the years, computer systems have evolved from centralized monolithic computing devices supporting static applications, into client-server environments that allow complex forms...
Mobile phone usage for m‐learning: comparing heavy and light mobile phone users
Mobile phone usage for m‐learning: comparing heavy and light mobile phone users
PurposeMobile technologies offer the opportunity to embed learning in a natural environment. The objective of the study is to examine how the usage of mobile phones for m‐learning ...
Joint Beamforming and Aerial IRS Positioning Design for IRS-assisted MISO System with Multiple Access Points
Joint Beamforming and Aerial IRS Positioning Design for IRS-assisted MISO System with Multiple Access Points
<p><code>Intelligent reflecting surface (IRS) is a promising concept for </code><code><u>6G</u></code><code> wireless communications...
Joint Beamforming and Aerial IRS Positioning Design for IRS-assisted MISO System with Multiple Access Points
Joint Beamforming and Aerial IRS Positioning Design for IRS-assisted MISO System with Multiple Access Points
<p><code>Intelligent reflecting surface (IRS) is a promising concept for </code><code><u>6G</u></code><code> wireless communications...
ACM SIGCOMM computer communication review
ACM SIGCOMM computer communication review
At some point in the future, how far out we do not exactly know, wireless access to the Internet will outstrip all other forms of access bringing the freedom of mobility to the way...

