Advertisement

Mobile Agent Security

  • Christian F. Tschudin
Chapter

Abstract

Let’s get mobile! This is the Zeitgeist at the end of this century. The cold war is over and with it disappeared the literally frozen constellation of opposing power blocks. Money is flowing almost freely through a increasingly global economy, data is even more mobile, computer networks at the lowest sea levels as well as in space provide global connectivity to stationary as well as mobile end devices. But mobility is also on a triumphant march into the very core of computers: The JAVA programming language has demonstrated to everybody that software can be mobile too. Today, software mobility is studied at the application layer (Mobile Software Agents) as well as network layer (Active Networks). Indeed, we only see the beginning of a new technology. Consequently, code mobility is subject to intense research. In this chapter we look at one of these research topics that, as everybody agrees, is critical for the success of mobile agent technology: security.

Keywords

Mobile Agent Security Policy Execution Environment Mobile Code Execution Platform 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 1999

Authors and Affiliations

  • Christian F. Tschudin
    • 1
  1. 1.Department of Computer SystemsUppsala UniversityUppsalaSweden

Personalised recommendations