Abstract | ||
---|---|---|
Code sharing is a popular but high risk activity in computing network communications. It is hard to determine if a piece of code contains malicious action. The existing approaches mainly focus on the traditional centralized network model and are not suitable for the Peer-to-Peer (P2P) code sharing. In this paper, we propose a secured code sharing system which establishes an efficient P2P sharing channel and attests the identity of the shared code. The risk of importing malicious code can be reduced by accepting software with valid identity. Moreover, the system is feasible to be adopted on mobile devices with limited resources. |
Year | DOI | Venue |
---|---|---|
2006 | 10.1109/ITNG.2006.28 | ITNG |
Keywords | Field | DocType |
shared code,malicious action,network communication,code sharing,high risk activity,peer-to-peer communications,p2p sharing channel,traditional centralized network model,secure code,valid identity,secured code sharing system,malicious code,computer network,distributed programming,digital signatures,p2p,mobile device,network model,information technology,java,computer networks | Peer-to-peer,Computer security,Computer science,Computer network,Dead Peer Detection,Communication channel,Peer to peer computing,Mobile device,Software,Code sharing,Network model,Distributed computing | Conference |
ISBN | Citations | PageRank |
0-7695-2497-4 | 0 | 0.34 |
References | Authors | |
3 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Wei Wu | 1 | 0 | 0.34 |
Phu Dung Le | 2 | 161 | 24.04 |