Full metadata record
DC FieldValueLanguage
dc.contributor.authorShieh, SPen_US
dc.contributor.authorLin, CTen_US
dc.contributor.authorWu, SYen_US
dc.date.accessioned2014-12-08T15:47:02Z-
dc.date.available2014-12-08T15:47:02Z-
dc.date.issued1999-01-15en_US
dc.identifier.issn0140-3664en_US
dc.identifier.urihttp://hdl.handle.net/11536/31576-
dc.description.abstractIn this paper, a model for software authorization and protection in mobile code systems is proposed. In the model, a software is partitioned into objects, called mobile agents, and the privileges to access these agents are separated and distributed to the user's local system and a number of trusted servers called trusted computational proxies. The execution of a program (software) is conducted by cooperation of the agents and the proxies that contain them. Two agents are dependent if there is a message passing between them. To reduce the risk of software being attacked,dependent agents are distributed to different proxies. In this way, if a proxy is compromized, minimal information of the software will be disclosed. Methods for assigning agents to proxies are also proposed to minimize, under the security constraints, computation load of the proxies as well as communication load between the user's local system and proxies. (C) 1999 Elsevier Science B.V. All rights reserved.en_US
dc.language.isoen_USen_US
dc.subjectsoftware protectionen_US
dc.subjectmobile codeen_US
dc.subjectremote executionen_US
dc.subjectJava languageen_US
dc.subjectproxyen_US
dc.titleOptimal assignment of mobile agents for software authorization and protectionen_US
dc.typeArticleen_US
dc.identifier.journalCOMPUTER COMMUNICATIONSen_US
dc.citation.volume22en_US
dc.citation.issue1en_US
dc.citation.spage46en_US
dc.citation.epage55en_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
dc.identifier.wosnumberWOS:000079026100006-
dc.citation.woscount1-
Appears in Collections:Articles


Files in This Item:

  1. 000079026100006.pdf