{"title":"Information theoretical approach to mobile code","authors":"K. Cartrysse, J. Lubbe","doi":"10.1109/ISIT.2005.1523537","DOIUrl":null,"url":null,"abstract":"Mobile code is software code that may be run at a remote location, which is possibly untrustworthy. This paper provides a secrecy model for mobile code based on Shannon's information theoretic model. Due to different characteristics of mobile code, such as the possibility of plaintext-attacks and untrustworthy execution environments, a new definition for the maximum level of secrecy is necessary. This results in different minimum requirements to obtain this level of secrecy. Furthermore, the unicity distance is derived in various situations","PeriodicalId":166130,"journal":{"name":"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISIT.2005.1523537","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
Mobile code is software code that may be run at a remote location, which is possibly untrustworthy. This paper provides a secrecy model for mobile code based on Shannon's information theoretic model. Due to different characteristics of mobile code, such as the possibility of plaintext-attacks and untrustworthy execution environments, a new definition for the maximum level of secrecy is necessary. This results in different minimum requirements to obtain this level of secrecy. Furthermore, the unicity distance is derived in various situations