A Survey on Different Security Techniques of Mobile Code
Manoj Kumar Meena1, Shweta Meena2
1Prof. Manoj Kumar Meena, Department of IT, IITM, Gwalior, (M.P.),India.
2Prof. Shweta Meena, Department of CSE, ITM, Gwalior, (M.P.), India.
Manuscript received on 21 March 2013 | Revised Manuscript received on 28 March 2013 | Manuscript published on 30 March 2013 | PP: 201-203 | Volume-2 Issue-1, March 2013 | Retrieval Number: A0509032113/2013©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Mobile agents are software which moves autonomously through a computer network with aim to perform some computation or gather information on behalf of its creator or an application. In the last several years, mobile agents have proved its numerous applications including e-commerce. In most applications, the security of mobile agents is a burning issue. This article presents comparison of different aspects of mobile code security, namely the protection of hosts receiving a malicious mobile code and the protection of a mobile code within a malicious host.
Keywords: Security, Mobile Agents, Mobile Code, Malicious host, Electronic Commerce.
Scope of the Article: Mobile Computing and Applications