
The mobile agent (MA) paradigm advocates the migration of agent code to achieve computational goals. MAs require an executable environment on hosts where mobile code can be executed. The execution of foreign code on a host raises security concerns for both the agent and the host. In Corradi et al. [2000] it has been recognized that most of the approaches for providing security in MA suffer from a limitation of expressing complex security requirements. Thus, approaches have been proposed that introduce the use of a policy language for specifying security policies to control MA's access to host resources. With this paper, we outline a framework where security policies can be uniformly specified for protecting both MAs and host resources.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 1 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
