A Survey on Different Security Techniques of Mobile Code
Sanjay Sharma1, P. S. Patheja2, Akhilesh A. Waoo3, Rahul Gour4
1Dr. Sanjay Sharma, AP, Deparment of MCA, MANIT, Bhopal (M.P.), India.
2P. S. Patheja, Research Scholar, MANIT, Bhopal (M.P.), India.
3Akhilesh A. Waoo, Research Scholar, MANIT, Bhopal (M.P.), India.
4Rahul Gour, M. Tech. (CSE), BIST, Bhopal (M.P.), India.
Manuscript received on October 06, 2011. | Revised Manuscript received on October 12, 2011. | Manuscript published on October 30, 2011 . | PP: 30-34 | Volume-1 Issue-1, October 2011. | Retrieval Number: A0104101111/2011©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Mobile agents are software which moves autonomously through a computer network with aim to perform some computation or gather information on behalf of its creator or an application. In the last several years, mobile agents have proved its numerous applications including e-commerce. In most applications, the security of mobile agents is a burning issue. There are plenty of techniques to protect mobile code. There need a brief discussion about each method including strength and limitation so it may guide to choose best techniques for individual application. This paper presented a overview of various security techniques with their strength and limitation. This article presents comparison of different aspects of mobile code security, namely the protection of hosts receiving a malicious mobile code and the protection of a mobile code within a malicious host
Keywords: Security, Mobile agents, Mobile code, malicious host, Electronic commerce.