Development of Concealing the Purpose of Processing for Programs in a Distributed Computing Environment

  • Kinoshita Y
  • Kashiwagi K
  • Higami Y
  • et al.
N/ACitations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Recently, distributed computing systems are popular among networksecurity researchers. Distributed computing systems have the problem ofrequired programs being analyzed by malicious computers and people. Thatis to say, in the four senses of a program, the purpose of processingcan be analyzed. The easiest solution to this problem is constructed ofonly trustworthy computers. However, not all computers on the Internetcan be considered trustworthy. There are presently no effective securitysolutions for this problem. We are developing systems to conceal thepurpose of processing. In this paper, we prove that the proposed methodconceals the purpose of processing. The proposed method is adaptabilitywith the mobile code systems and grid of the distributed computingsystems. We are planning on a method of interleaving multiple fragments,and making an effective dummy code and segments.

Cite

CITATION STYLE

APA

Kinoshita, Y., Kashiwagi, K., Higami, Y., & Kobayashi, S.-Y. (2007). Development of Concealing the Purpose of Processing for Programs in a Distributed Computing Environment. In Advances in Information Processing and Protection (pp. 263–269). Springer US. https://doi.org/10.1007/978-0-387-73137-7_23

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free