Skip to Main Content
Programs are no longer constrained to execute on the nodes where they reside, and many systems therefore support code mobility. Although mobile code has yet to fully realize its promise of increased system flexibility, scalability, and reliability, the marketplace has embraced mobile code implementations such as Java.Jini, PostScript, and .NET. Several mobile code paradigms exist, and mobile code use raises many security concerns. Here, we map a taxonomy of mobile code paradigms to a taxonomy of network security vulnerabilities, revealing that many important security issues are being ignored.