Technical Reports (CIS)

Document Type

Technical Report

Date of this Version

May 1998


University of Pennsylvania Department of Computer and Information Science Technical Report No. MS-CIS-98-28.


This paper presents a survey of existing techniques for achieving mobile code security, as well as a representative sampling of systems which use them. In particular, the problem domain is divided into two portions: protecting hosts from malicious code; and protecting mobile code from malicious hosts. The discussion of the malicious code problem includes a more in-depth study of the Java security model, as well as touching upon several other systems. The malicious host problem, however, is much more difficult to solve, so our discussion is mostly restricted to ongoing research in that area.



Date Posted: 22 June 2007