Optimal assignment of mobile agents for software authorization and protection

Shiuhpyng Shieh*, Chern Tang Lin, Shianyow Wu

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

2 Scopus citations


In this paper, a model for software authorization and protection in mobile code systems is proposed. In the model, a software is partitioned into objects, called mobile agents, and the privileges to access these agents are separated and distributed to the user's local system and a number of trusted servers called trusted computational proxies. The execution of a program (software) is conducted by cooperation of the agents and the proxies that contain them. Two agents are dependent if there is a message passing between them. To reduce the risk of software being attacked, dependent agents are distributed to different proxies. In this way, if a proxy is compromized, minimal information of the software will be disclosed. Methods for assigning agents to proxies are also proposed to minimize, under the security constraints, computa-tion load of the proxies as well as communication load between the user's local system and proxies.

Original languageEnglish
Pages (from-to)46-55
Number of pages10
JournalComputer Communications
Issue number1
StatePublished - 1 Jan 1999


  • Java language
  • Mobile code
  • Proxy
  • Remote execution
  • Software protection

Fingerprint Dive into the research topics of 'Optimal assignment of mobile agents for software authorization and protection'. Together they form a unique fingerprint.

Cite this