Abstract
Let’s get mobile! This is the Zeitgeist at the end of this century. The cold war is over and with it disappeared the literally frozen constellation of opposing power blocks. Money is flowing almost freely through a increasingly global economy, data is even more mobile, computer networks at the lowest sea levels as well as in space provide global connectivity to stationary as well as mobile end devices. But mobility is also on a triumphant march into the very core of computers: The JAVA programming language has demonstrated to everybody that software can be mobile too. Today, software mobility is studied at the application layer (Mobile Software Agents) as well as network layer (Active Networks). Indeed, we only see the beginning of a new technology. Consequently, code mobility is subject to intense research. In this chapter we look at one of these research topics that, as everybody agrees, is critical for the success of mobile agent technology: security.
Part of this work was done while at the Computer Science Department of the University of Zurich, Switzerland.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Tschudin, C.F. (1999). Mobile Agent Security. In: Klusch, M. (eds) Intelligent Information Agents. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-60018-0_22
Download citation
DOI: https://doi.org/10.1007/978-3-642-60018-0_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-64223-4
Online ISBN: 978-3-642-60018-0
eBook Packages: Springer Book Archive