Security mechanisms for mobile code in evolutionary networks

Research output: Contribution to journalArticlepeer-review

Abstract

Considering that evolutionary networks with dynamic program loading structures introduces potential security problems, some security mechanisms for the mobile code in this kind of networks were proposed. Because the mobile code is in the form of data when in transmission while in the form of program when in execution, the research addressed both the security of static data and the security of dynamic program. A mechanism for verifying the integrity of the mobile code was proposed to ensure the safe transmitting and deploying of the mobile code. The trust platform module was used to generate the encryption key and to verify the hardware and software configurations of the node. The runtime dynamic access control mechanism and the resource monitor management mechanism were proposed to guarantee the mobile code's safe execution. These mechanisms improve the security of evolutionary networks.

Original languageEnglish
Pages (from-to)147-152
Number of pages6
JournalGaojishu Tongxin/Chinese High Technology Letters
Volume22
Issue number2
DOIs
StatePublished - Feb 2012

Keywords

  • Evolutionary network
  • Integrity verification
  • Mobile code
  • Network security

Fingerprint

Dive into the research topics of 'Security mechanisms for mobile code in evolutionary networks'. Together they form a unique fingerprint.

Cite this