<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd"><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article"><front><journal-meta><journal-id journal-id-type="publisher-id">INFORMATICA</journal-id><journal-title-group><journal-title>Informatica</journal-title></journal-title-group><issn pub-type="epub">0868-4952</issn><issn pub-type="ppub">0868-4952</issn><publisher><publisher-name>VU</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">INF11105</article-id><article-id pub-id-type="doi">10.3233/INF-2000-11105</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research article</subject></subj-group></article-categories><title-group><article-title>Mobile Code Alternatives for Secure Environments</article-title></title-group><contrib-group><contrib contrib-type="Author"><name><surname>Pakštas</surname><given-names>Algirdas</given-names></name><email xlink:href="mailto:a.pakstas@ieee.org">a.pakstas@ieee.org</email><xref ref-type="aff" rid="j_INFORMATICA_aff_000"/><xref ref-type="aff" rid="j_INFORMATICA_aff_001"/></contrib><contrib contrib-type="Author"><name><surname>Shagaev</surname><given-names>Igor</given-names></name><email xlink:href="mailto:ish@ipu.rssi.ru">ish@ipu.rssi.ru</email><xref ref-type="aff" rid="j_INFORMATICA_aff_002"/></contrib><aff id="j_INFORMATICA_aff_000">University of Sunderland, School of Computing, Engineering and Technology, Chester Road, Sunderland SR1 3SD, England</aff><aff id="j_INFORMATICA_aff_001">Institute of Mathematics and Informatics, Akademijos 4, 2600 Vilnius, Lithuania</aff><aff id="j_INFORMATICA_aff_002">Institute of Control Sciences, Profsoyuznaya St. 65, Moscow, Russia</aff></contrib-group><pub-date pub-type="epub"><day>01</day><month>01</month><year>2000</year></pub-date><volume>11</volume><issue>1</issue><fpage>49</fpage><lpage>64</lpage><history><date date-type="received"><day>01</day><month>03</month><year>2000</year></date></history><abstract><p>Growing popularity of the mobile code requires to consider various aspects related to its security. In the aviation industry there is a case when additional information needs to be delivered to the pilot by uploading it from the ground station. It creates a need for a platform-independent solution and it raises a problem of the mobile code security as well. Organization of the security in the Base System (similar to extranets) as well as the security issues of the mobile code (or safelets for use in the aircrafts) delivered to the Remote Platform are discussed in the paper. Safelet implementation technologies and issues of code effectiveness and safety itself are discussed with Java and Juice/Oberon technologies been compared.</p></abstract><kwd-group><label>Keywords</label><kwd>mobile code</kwd><kwd>security</kwd><kwd>Java</kwd><kwd>Oberon/Juice</kwd><kwd>aviation applications</kwd><kwd>safelets</kwd></kwd-group></article-meta></front></article>