Skip to main content
Log in

Bidirectional Mobile Code Trust Management Using Tamper Resistant Hardware

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

Trust management in a networked environment consists of authentication and integrity checking. In a mobile computing environment, both remote hosts and mobile code are suspect. We present a model that addresses trust negotiation between the remote host and the mobile code simultaneously. Our model uses tamper resistant hardware, public key cryptography, and one-way hash functions.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. K. Arnold and J. Gosling, The Java Programming Language, 2nd ed. (Addison-Wesley).

  2. K. Brockschmidt, Inside OLE, 2nd ed. (Microsoft Press, 1995).

  3. R. Brooks and S. Iyengar, Robust distributed computing and sensing algorithm, IEEE Computer 29(6) (June 1996).

  4. B. DeDecker, F. Piessens, E. Van Hoeymissen and G. Neven, Semitrusted hosts and mobile agents: Enabling secure distributed computations, in: Proc. of the Second International Workshop, MATA 2000, ed. E. Horlait, Paris, France (2000).

  5. FIPA, Foundation for Intelligent Physical Agents, http: //www. fipa.org

  6. J. Fritzlinger and M. Mueller, Java security, Sun Microsystems White Paper (1996) http: //java.sun.com/security/whitepaper.txt

  7. A. Fuggetta, G. Picco and G. Vigna, Understanding code mobility, IEEE Transactions on Software Engineering 24(5) (May 1998).

  8. F. Hohl, An approach to solve the problem of malicious hosts, University of Stuttgart TR 1997-03 (1997).

  9. IBM, Aglets Workbench, http: //www.trl.ibm.co.jp/ aglets/index.html

  10. B. Lampson, A note on the confinement problem, Communications of the ACM 16(10) (October 1974).

  11. P. Lee and G. Necula, Research on proof-carrying code for mobile code security, in: DARPA Workshop on Foundations for Secure Mobile Code (March 1997).

  12. S. Loureiro and R. Molva, Function hiding based on error correcting codes, in: Proceedings of the International Workshop on Cryptographic Techniques and Electronic Commerce (July 1999).

  13. S. Loureiro and R. Molva, Mobile code protection with smartcards, in: Proceedings of ECOOP 2000 Workshop on Mobile Object Systems, Cannes, France (June 2000).

  14. G. Necula, Proof-carrying code, in: Proceedings of the 24th ACM Symposium on Principles of Programming Languages, ed. N. Jones, Paris, France (1997).

  15. S. Pleisch, State of the art of mobile agent computing: Security, fault tolerance, and transaction support, IBM Research Technical Report, RZ3152 (1999).

  16. T. Ramabadran and S. Gaitonde, A tutorial on CRC computations, IEEE Micro (August 1988).

  17. A. Rubin and D. Geer, Mobile code security, IEEE Internet (November/ December 1998).

  18. T. Sander and C. Tschudin, Towards mobile cryptography, in: Proc. 1998 IEEE Symposium on Security and Privacy (1998).

  19. B. Schneier, Applied Cryptography (Wiley, 1994).

  20. H. Shrobe and J. Doyle, Active trust management for autonomous adaptive survivable systems (ATMs for AAss's), in: Proc. International Workshop on Self-Adaptive Software (April 2000).

  21. D. Solomon, Inside Windows NT, 2nd ed. (Microsoft Press, 1998).

  22. W. Stallings, Network Security Essentials: Applications and Standards (Prentice-Hall, 2000).

  23. D. Wong, N. Paciorek and D. Moore, Java based mobile agents, Communications of the ACM 42(3) (March 1999).

  24. B. Yee, Using secure coprocessors, Carnegie Mellon University School of Computer Science Technical Report, CMU-CS-94-149 (1994).

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zachary, J., Brooks, R. Bidirectional Mobile Code Trust Management Using Tamper Resistant Hardware. Mobile Networks and Applications 8, 137–143 (2003). https://doi.org/10.1023/A:1022281014117

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/A:1022281014117

Navigation