Implementing mobile agent security in an untrusted computing environment | IEEE Conference Publication | IEEE Xplore