DocumentCode :
2724303
Title :
Mobile Objects Security Protocols
Author :
Dorin, Simina ; Todoran, Eneia Nicolae
Author_Institution :
Dept. of Comput. Sci., Tech. Univ. of Cluj-Napoca, Cluj-Napoca, Romania
fYear :
2011
fDate :
6-8 July 2011
Firstpage :
186
Lastpage :
190
Abstract :
We consider the problem of implementing a security protocol in such a manner that secrecy of sensitive data is not jeopardized. The implementation is assumed to take place in the context of a language named Join Voyagers used to program a Peer-to-Peer network using object oriented techniques and Join methods. A mobile agent is an object that can migrate throughout a heterogeneous network of computers, under its own control, in order to perform tasks using resources of these nodes. We develop a basic architecture to express security protocols for communication and strong migration, or to enforce cryptographic primitives based on SPI calculus. These protocols rely on cryptography and on communication channels with properties like authenticity and privacy. This article will present also a series of aspects related to mobile code security, namely the protection of hosts receiving a malicious code and the protection of a mobile code within a malicious host from our programmable Peer-to-Peer network.
Keywords :
cryptographic protocols; mobile agents; object-oriented methods; peer-to-peer computing; Join methods; SPI calculus; cryptographic primitives; heterogeneous network; mobile agent; mobile code security; mobile objects security protocols; object oriented techniques; peer-to-peer network; Calculus; Cryptography; Mobile communication; Peer to peer computing; Protocols; Syntactics; P2P; SPI; join calculus; jxta; mobility; security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Parallel and Distributed Computing (ISPDC), 2011 10th International Symposium on
Conference_Location :
Cluj Napoca
Print_ISBN :
978-1-4577-1536-5
Type :
conf
DOI :
10.1109/ISPDC.2011.35
Filename :
6108272
Link To Document :
بازگشت