Optimal Assignment of Mobile Agents for Software Authorization and Protection

  title={Optimal Assignment of Mobile Agents for Software Authorization and Protection},
  author={Shiuh-Pyng Shieh and Chern-Tang Lin and Shianyow Wu},
  journal={Comput. Commun.},
In this paper, a model for software authorization and protection in mobile code systems is proposed. In the model, a software is partitioned into objects, called mobile agents, and the privileges to access these agents are separated and distributed to the user's local system and a number of trusted servers called trusted computational proxies. The execution of a program (software) is conducted by cooperation of the agents and the proxies that contain them. Two agents are dependent if there is a… Expand
3 Citations
Comparative Advantage of Mobile Agent Application in Procuring Software Products on the Internet
A system whereby the products come on compact disk with mobile agent as deliverable with inherent advantages in application of mobile agents to procure software products rather than downloading software content on the Internet is proposed. Expand
Modeling and Simulation of Urban Trunk Road Traffic Signal Coordinated Control Based on Immune Algorithm
In order to reduce traffic delay, a novel urban trunk road traffic signal coordinated control method using a multi-Population immune algorithm was presented. Considering the traffic delay of theExpand
Urban Trunk Road Traffic Signal Coordinated Control Based on Multi-Objective Immune Algorithm
  • Pei Luo, Qian Ma, Hui-xian Huang
  • Engineering, Computer Science
  • 2009 International Asia Conference on Informatics in Control, Automation and Robotics
  • 2009
A multi-objective immune algorithm based on multi-population can effectively prevent population retrogression; promote diversity and the whole optimal searching ability of genetic algorithm; and reduce traffic delay. Expand


A Security Model for Aglets
A security model for the Aglets development environment that supports flexible architectural definition of security policies is described, which is based on the model developed at IBM's Tokyo Research Laboratory. Expand
Protecting externally supplied software in small computers
  • S. Kent
  • Engineering, Computer Science
  • 1980
This thesis employs two tools to achieve the security requirements of vendors of external software: tamper-resistant modules (TRMs) and cryptographic techniques. Expand
Agent tcl: a transportable agent system
The architecture of Agent Tcl is described and its current implementation is presented and four information-management applications in which Agent TCl has proven useful are presented. Expand
Trusted distribution of software over the Internet
  • A. Rubin
  • Computer Science
  • Proceedings of the Symposium on Network and Distributed System Security
  • 1995
Bellcore's Trusted Software Integrity (Betsi) System, an implementation of the design, is presented and a detailed design is provided. Expand
Secure Code Distribution
Two approaches to authentification for code distribution are described: one extends the JVM to include a digital signature in applets; the other uses MIME encapsulation to take advantage of available security infrastructures. Expand
ABYSS: An Architecture for Software Protection
A novel use-once authorization mechanism, called a token, is introduced as a solution to the problem of providing authorizations without direct communication, and guidelines to its solution are offered. Expand
Jada - Coordination and Communication for Java Agents
This chapter introduces Jada, a coordination toolkit for Java where coordination among either concurrent threads or distributed Java objects is achieved via shared object spaces, and thinks that this technology can give its best in the field of distributed-cooperative work, both in the perspective of Internet and Intranet connectivity. Expand
Distributed computing using autonomous objects
  • L.F. Bic
  • Computer Science
  • Proceedings of the Fifth IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems
  • 1995
This work surveys and classify several existing systems that fall into the general category of autonomous objects and presents a unifying view of the paradigm by describing the principles of a high-level language and its interpreter, suitable to express the behaviors of complex autonomous objects, called Messengers. Expand
A software authentication system for information integrity
This paper describes a software authentication technique based on the public key cryptography for information integrity that can be used to verify the integrity of programs obtained from vendors or a ''trusted information database''. Expand
Patent, copyright and trade secret protection for software
Crucial to the value of computers has been the development of software. Software development can require many hours of programming work. Typically, complex software is developed by a team ofExpand