Sciweavers

410 search results - page 1 / 82
» Software Protection with Code Mobility
Sort
View
IJNSEC
2008
150views more  IJNSEC 2008»
13 years 11 months ago
Tamper Resistant Software Through Intent Protection
One approach to protect distributed systems implemented with mobile code is through program obfuscation. Disguising program intent is a form of information hiding that facilitates...
Alec Yasinsac, J. Todd McDonald
MOBICOM
1997
ACM
14 years 3 months ago
A Protection Scheme for Mobile Agents on Java
: This paper describes a protection scheme for mobile agents implemented on a Java environment. In this scheme, access to objects is controlled by means of software capabilities th...
Daniel Hagimont, Leila Ismail
JPDC
2006
141views more  JPDC 2006»
13 years 10 months ago
M-TREE: A high efficiency security architecture for protecting integrity and privacy of software
Secure processor architectures enable new sets of applications such as commercial grid computing, software copy protection and secure mobile agents by providing secure computing e...
Chenghuai Lu, Tao Zhang, Weidong Shi, Hsien-Hsin S...
CSREASAM
2007
14 years 9 days ago
Software Protection by Hardware and Obfuscation
In this paper, we propose an architecture that protects software by the hardware. The protection hardware can reside on the local machine in the form of a chip or on a remote serv...
Bin Fu, Sai Aravalli, John Abraham
ISW
2000
Springer
14 years 2 months ago
Towards a Practical Secure Framework for Mobile Code Commerce
Securing the mobile code commerce is not an easy task at all. We propose in this paper a framework to tackle this problem. In a first step, we analyse the general issues that must ...
Gaël Hachez, Laurent Den Hollander, Mehrdad J...