Protecting network users in mobile code systems

Shiuhpyng Shieh*, Wen Her Yang

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

Conventional access control mechanisms are rather insensitive to occurrences of context-dependent illegal accesses. Insensitivity to context-dependent accesses may lead to failure to protect network users and resources. Context-dependent illegal accesses resulting from data and privilege flows in open networks cannot be prevented by either authentication or access control mechanisms since unauthorized access need not be attempted. In this paper we present a protection model which tracks data and privilege flows in mobile code systems. It can uniformly define various types of illegal access patterns and has the advantage of preventing context-dependent illegal accesses such as those caused by inadvertent execution of remote mobile code containing viruses or Trojan Horses. The proposed flow control model is expected to complement the conventional model for access control.

Original languageEnglish
Pages (from-to)191-200
Number of pages10
JournalJournal of Parallel and Distributed Computing
Volume64
Issue number2
DOIs
StatePublished - Feb 2004

Keywords

  • Access control
  • Flow control
  • Internet security
  • Java
  • Mobile code
  • Remote execution
  • World Wide Web

Fingerprint

Dive into the research topics of 'Protecting network users in mobile code systems'. Together they form a unique fingerprint.

Cite this