Abstract
From a security perspective, the most relevant attribute of mobile computations is that they can cross security domain boundaries. This is important since security policies and mechanisms are often location-sensitive. When boundaries are crossed, trust relationships can change and hence trust decisions can no longer be made statically. For instance, a host’s trust in an agent may change as the agent migrates through other potentially-hostile hosts.
Funded by the MITRE-Supported Research Program.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Swarup, V. (1998). Mobile Computations and Trust. In: Demeyer, S., Bosch, J. (eds) Object-Oriented Technology: ECOOP’98 Workshop Reader. ECOOP 1998. Lecture Notes in Computer Science, vol 1543. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49255-0_82
Download citation
DOI: https://doi.org/10.1007/3-540-49255-0_82
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65460-5
Online ISBN: 978-3-540-49255-9
eBook Packages: Springer Book Archive