Abstract
In mobile computing environments, where clients have limited computing power and memory, it is common for mobile clients to use a fixed host server to execute their applications. Application hosting services, which rent out storage, (Internet) presence, and computation power to clients with IT needs (but without appropriate infrastructures) have been widely adopted. A common way these hosting services are used is as follows: (1) The customer (or application owner) A with an application P publishes this application along with the relevant data onto the servers of the host, H. (2) Whenever they need, the customer (or application owner) A or its clients access the application remotely by passing appropriate parameter variables v to the host. (3) The host, then, runs P(v) with the local data, and sends the result back to the requesting party. (4) The host charges the customer (or application owner) based on the resources (bandwidth, CPU, storage, etc.) required for the processing of the request.
This work is supported by the AFOSR grant #F49620-00-1-0063 P0003.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lin, P., Selçuk Candan, K., Bazzi, R., Liu, Z. (2003). Hiding Data and Code Security for Application Hosting Infrastructure. In: Chen, H., Miranda, R., Zeng, D.D., Demchak, C., Schroeder, J., Madhusudan, T. (eds) Intelligence and Security Informatics. ISI 2003. Lecture Notes in Computer Science, vol 2665. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44853-5_38
Download citation
DOI: https://doi.org/10.1007/3-540-44853-5_38
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40189-6
Online ISBN: 978-3-540-44853-2
eBook Packages: Springer Book Archive