{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T12:50:28Z","timestamp":1725454228482},"publisher-location":"New York","reference-count":48,"publisher":"Springer-Verlag","isbn-type":[{"type":"print","value":"0387244859"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/0-387-24486-7_5","type":"book-chapter","created":{"date-parts":[[2005,10,9]],"date-time":"2005-10-09T18:15:45Z","timestamp":1128881745000},"page":"59-78","source":"Crossref","is-referenced-by-count":10,"title":["An Overview of Security Issues and Techniques in Mobile Agents"],"prefix":"10.1007","author":[{"given":"Mousa","family":"Alfalayleh","sequence":"first","affiliation":[]},{"given":"Ljiljana","family":"Brankovic","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"J. White, \u201cMobile Agents White Paper,\u201d General Magic Inc., 1996."},{"key":"5_CR2","unstructured":"N. Karnik, \u201cSecurity in Mobile Agent systems,\u201d Ph.D. Dissertation, Department of Computer Science, University of Minnesota, Oct. 1998."},{"key":"5_CR3","unstructured":"S. Fischmeister, &quot;Building Secure Mobile Agents: The Supervisor-Worker Framework,\" Diploma Thesis, Technical University of Vienna, Feb. 2000."},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"W. Jansen and T. Karygiannis, \u201cMobile Agent Security,\u201d NIST Special Publication 800-19, National Institute of Standard and Technology, 2000.","DOI":"10.6028\/NIST.SP.800-19"},{"key":"5_CR5","unstructured":"S. McGrath, D. Chac n, and K. Whitebread, \u201cIntelligent Mobile Agents in Military Command and Control,\u201d Advanced Technology Laboratories, New Jersey."},{"key":"5_CR6","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/S0141-9331(01)00099-0","volume":"25","author":"G. P. Picco","year":"2001","unstructured":"G. P. Picco, \u201cMobile Agents: An Introduction\u201d, Journal of Microprocessors and Microsystems, (25):65, 2001.","journal-title":"Journal of Microprocessors and Microsystems"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"R. Wahbe, S. Lucco, T. E. Anderson, and S. L. Graham, \u201cEfficient software-based fault isolation,\u201d In Proceedings of the 14th ACM Symposium on Operating Systems Principles, pages 203\u2013216, Dec. 1993.","DOI":"10.1145\/168619.168635"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"D. Rubin and D. E. Geer, &quot;Mobile code security,&quot; IEEE Internet Computing, 1998.","DOI":"10.1109\/4236.735984"},{"key":"5_CR9","volume-title":"Is Java still secure?","author":"D. Chess","year":"1998","unstructured":"D. Chess, J. Morar, \u201cIs Java still secure?,\u201d IBM T.J. Watson Research Center, NY, 1998."},{"key":"5_CR10","volume-title":"Java Security Architecture (JDK 1.2)","author":"L. Gong","year":"1998","unstructured":"L. Gong, \u201cJava Security Architecture (JDK 1.2),\u201d Technical Report, Sun Microsystems, Inc., 901 San Antonio Road, Palo Alto, California 94303, U.S.A, 1998."},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Li Gong, \u201dSecure Java class loading,\u201d IEEE Internet Computing, pages 56\u201361, 1998.","DOI":"10.1109\/4236.735987"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"M. Hauswirth, C. Kerer, and R. Kurmanowytsch, \u201cA secure execution framework for Java,\u201d In Proceedings of the 7th ACM conference on computer and communications security (CCS 2000), pages 43\u201352, Athens, Greece, Nov. 2000.","DOI":"10.1145\/352600.352608"},{"key":"5_CR13","unstructured":"L. Gong, M. Mueller, H. Prafullchandra, and R. Schemers, \u201cGoing Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2,\u201d In Proceedings of the USENIX Symposium on Internet Technologies and Systems, Monterey, California, Dec. 1997."},{"key":"5_CR14","unstructured":"\u201cSigned Code,\u201d (n:d.). Retrieved December 15, 2003, from James Madison University, IT Technical Services Web site: http:\/\/www.jmu.edu\/computing\/infosecurity\/engineering\/issues\/signedcode.shtml"},{"key":"5_CR15","unstructured":"\u201cIntroduction to Code Signing,\u201d (n.d.). Retrieved December 15, 2003, from Microsoft Corporation, Microsoft Developer Network (MSDN) Web site: http:\/\/msdn.microsoft.com\/library\/default.asp?url=\/workshop\/security\/authcode\/intro_authenticode.asp"},{"key":"5_CR16","unstructured":"Gary McGraw and Edward Felten (1996-9). Securing JAVA [Electronic version], John Wiley and Sons. http:\/\/www.securingjava.com\/"},{"key":"5_CR17","unstructured":"M. Dageforde. (n.d.). \u201cSecurity Features Overview,\u201d Retrieved December 21, 2003, from Sun Microsystems, Inc. The JavaTM Tutorial Web site: http:\/\/java.sun.com\/docs\/books\/tutorial\/security1.2\/overview\/"},{"key":"5_CR18","unstructured":"R. Levin (1998). \u201cSecurity Grows Up: The Java 2 Platform,\u201d Retrieved December 21, 2003, from Sun Microsystems, Inc. Sun Developer Network (SDN) Web site: http:\/\/java.sun.com\/features\/1998\/11\/jdk.security.html"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"P. Lee and G. Necula, \u201cResearch on Proof-Carrying Code on Mobile-Code Security,\u201d In Proceedings of the Workshop on Foundations of Mobile Code Security, 1997.","DOI":"10.1145\/263699.263712"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"A. Appel, \u201cFoundational proof-carrying code,\u201d In Proceedings of the 16th Annual Symposium on Logic in Computer Science, pages 247\u2013256. IEEE Computer Society Press, 2001.","DOI":"10.1109\/LICS.2001.932501"},{"key":"5_CR21","unstructured":"S. Loureiro, R. Molva, and Y. Roudier, &quot;Mobile Code Security,&quot; Institut Eurecom, 2001."},{"key":"5_CR22","unstructured":"P. Lee. (n.d.), \u201cProof-carrying code,\u201d Retrieved December 28, 2003, from Web site: http:\/\/www-2.cs.cmu.edu\/~petel\/papers\/pcc\/pcc.html"},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"C. Colby, P. Lee, G. Necula, F. Blau, M. Plesko, and K. Cline, \u201cA Certifying Compiler for Java,\u201d SIGPLAN Conference on Programming Language Design and Implementation. Vancouver B.C., 2000.","DOI":"10.1145\/349299.349315"},{"key":"5_CR24","unstructured":"V. Swarup, \u201cTrust Appraisal and Secure Routing of Mobile Agents,\u201d DARPA Workshop on Foundations for Secure Mobile Code, Monterey, CA, USA, March 1997. Position Paper."},{"key":"5_CR25","doi-asserted-by":"crossref","unstructured":"W. M. Farmer, J. D. Guttman, and V. Swarup, \u201cSecurity for mobile agents: Authentication and state appraisal,\u201d In Proceedings of the European Symposium on Research in Computer Security (ESORICS), pages 118\u2013130, Sep. 1996.","DOI":"10.1007\/3-540-61770-1_31"},{"key":"5_CR26","volume-title":"Itinerant Agents for Mobile Computing","author":"D. Chess","year":"1995","unstructured":"D. Chess, B. Grosof, C. Harrison, D. Levine, C. Parris and G. Tsudik, \u201cItinerant Agents for Mobile Computing,\u201d Technical Report, Oct. 1995, IBM T.J. Watson Research Center, NY."},{"key":"5_CR27","doi-asserted-by":"crossref","unstructured":"J. J. Ordille, \u201cWhen Agents Roam, who Can You Trust?,\u201d Proceedings of the First Conference on Emerging Technologies and Applications in Communications, Portland, Oregon, May 1996.","DOI":"10.1109\/ETACOM.1996.502505"},{"key":"5_CR28","first-page":"147","volume-title":"Proceedings of the ECOOP Workshop on Distributed Object Security and 4th Workshop on Mobile Object Systems: Secure Internet Mobile Computations","author":"V. Roth","year":"1998","unstructured":"V. Roth, \u201cSecure Recording of Itineraries Through Cooperating Agents,\u201d Proceedings of the ECOOP Workshop on Distributed Object Security and 4th Workshop on Mobile Object Systems: Secure Internet Mobile Computations, pages 147\u2013154, INRIA, France, 1998."},{"key":"5_CR29","doi-asserted-by":"crossref","unstructured":"V. Roth, \u201cMutual protection of cooperating agents,\u201d In Secure Internet Programming: Security Issues for Mobile and Distributed Objects. J. Vitek and C. Jensen (Eds.), Springer Verlag, 1999.","DOI":"10.1007\/3-540-48749-2_13"},{"key":"5_CR30","unstructured":"Y. Ye and X. Yi, \u201cCoalition Signature Scheme in Multi-agent Systems,\u201d 2002."},{"key":"5_CR31","doi-asserted-by":"crossref","unstructured":"G. Vigna, \u201cCryptographic Traces for Mobile Agents,\u201d in: Giovanni Vigna (Ed.), Mobile Agent Security, LNCS 1419, 1998, Springer, pages 137\u2013153.","DOI":"10.1007\/3-540-68671-1_8"},{"key":"5_CR32","doi-asserted-by":"crossref","unstructured":"H. K. Tan and L. Moreau, \u201cExtending Execution Tracing for Mobile Code Security,\u201d In K. Fischer and D. Hutter (Eds.), Proceedings of Second International Workshop on Security of Mobile MultiAgent Systems (SEMAS'2002), pages 51\u201359, Bologna, Italy. 2002.","DOI":"10.1145\/508791.508807"},{"key":"5_CR33","doi-asserted-by":"crossref","unstructured":"H. K. Tan, L. Moreau, D. Cruickshank, and D. De Roure, \u201cCertificates for Mobile Code Security,\u201d In Proceedings of The 17th ACM Symposium on Applied Computing (SAC'2002) \u2014 Track on Agents, Interactions, Mobility and Systems, pages 76. 2002.","DOI":"10.1145\/508791.508807"},{"key":"5_CR34","doi-asserted-by":"crossref","unstructured":"J. Riordan and B. Schneier, &quot;Environmental Key Generation Towards Clueless Agents,\" G. Vinga (Ed.), Mobile Agents and Security, Springer-Verlag, Lecture Notes in Computer Science No. 1419, 1998.","DOI":"10.1007\/3-540-68671-1_2"},{"key":"5_CR35","unstructured":"C. Tschudin, \u201cApoptosis \u2014 the programmed death of distributed services,\u201d In Secure Internet Programming [14]."},{"key":"5_CR36","doi-asserted-by":"crossref","unstructured":"T. Sander and C. Tschudin, &quot;Protecting Mobile Agents Against Malicious Hosts,&quot; in G. Vinga (Ed.), Mobile Agents and Security, SpringerVerlag, Lecture Notes in Computer Science No. 1419, 1998.","DOI":"10.1007\/3-540-68671-1_4"},{"key":"5_CR37","doi-asserted-by":"crossref","unstructured":"T. Sander and C. Tschudin, \u201cTowards Mobile Cryptography,\u201d IEEE Symposium on Security and Privacy, pages 215\u2013224, May 1998.","DOI":"10.1109\/SECPRI.1998.674837"},{"key":"5_CR38","doi-asserted-by":"crossref","unstructured":"M. Abadi and J. Feigenbau, \u201cSecure circuit evaluation: a protocol based on hiding information from an oracle,\u201d Journal of Cryptology, vol. 2, 1990.","DOI":"10.1007\/BF02252866"},{"key":"5_CR39","unstructured":"L. D'Anna, B. Matt, A. Reisse, T. Van Vleck, S. Schwab, and P. LeBlanc, \u201cSelf-Protecting Mobile Agents Obfuscation Report,\u201d Report #03-015, Network Associates Laboratories, June 2003."},{"key":"5_CR40","unstructured":"G. Wroblewski, \u201cGeneral Method of Program Code Obfuscation,\u201d PhD Dissertation, Wroclaw University of Technology, Institute of Engineering Cybernetics, 2002, (under final revision)."},{"key":"5_CR41","doi-asserted-by":"crossref","unstructured":"F. Hohl, \u201cTime Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts,\u201d To appear in Mobile Agents and Security Book edited by Giovanni Vigna, published by Springer Verlag 1998.","DOI":"10.1007\/3-540-68671-1_6"},{"key":"5_CR42","doi-asserted-by":"crossref","unstructured":"B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, and K. Yang, \u201cOn the (Im)possibility of Obfuscating Programs,\u201d in Advances in Cryptology, Proceedings of Crypto'2001, Lecture Notes in Computer Science, Vol. 2139, pages 1\u201318.","DOI":"10.1007\/3-540-44647-8_1"},{"key":"5_CR43","unstructured":"G. Hachez, \u201cA Comparative Study of Software Protection Tools Suited for E-Commerce with Contributions to Software Watermarking and Smart Cards,\u201d Universite Catholique de Louvain, 2003."},{"key":"5_CR44","unstructured":"C. Collberg, C. Thomborson, and D. Low, \u201cA taxonomy of obfuscating transformations,\u201d Technical Report 148, Department of Computer Science, University of Auckland, July 1997."},{"key":"5_CR45","series-title":"Lecture Notes in Computer Science","volume-title":"Encryption Tools for Mobile Agents: Sliding Encryption","author":"A. Young","year":"1997","unstructured":"A. Young and M. Yung, \u201cEncryption Tools for Mobile Agents: Sliding Encryption,\u201d In: E. BIHAM (ed). Fast Software Encryption. Lecture Notes in Computer Science, no. 1267. Springer-Verlag, Germany, 1997."},{"issue":"7\/8","key":"5_CR46","first-page":"29","volume":"55","author":"K. G","year":"2000","unstructured":"G. Karjoth and J. Posegga, \u201cMobile Agents and Telcos' Nightmares,\u201d Annales des T\u00e9l\u00e9communications Vol. 55, No. 7\/8, 29\u201341, 2000.","journal-title":"Annales des T\u00e9l\u00e9communications"},{"key":"5_CR47","unstructured":"B. Yee, \u201cA Sanctuary for Mobile Agents,\u201d DARPA Workshop on Foundations for Secure Mobile Code, Feb. 1997."},{"key":"5_CR48","doi-asserted-by":"crossref","unstructured":"G. Karjoth, N. Asokan, and C. Glc, \u201cProtecting the Computation Results of Free-Roaming Agents,\u201d Second International Workshop on Mobile Agents, Stuttgart, Germany, Sep. 1998.","DOI":"10.1007\/BFb0057659"}],"container-title":["IFIP \u2014 The International Federation for Information Processing","Communications and Multimedia Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-24486-7_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,4]],"date-time":"2023-05-04T21:31:55Z","timestamp":1683235915000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-24486-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["0387244859"],"references-count":48,"URL":"https:\/\/doi.org\/10.1007\/0-387-24486-7_5","relation":{},"subject":[]}}