A Survey of E-Business SecurityFor Mobile Multi-Agent Environment
暂无分享,去创建一个
[1] Bruce Schneier,et al. Environmental Key Generation Towards Clueless Agents , 1998, Mobile Agents and Security.
[2] Wayne A. Jansen,et al. Countermeasures for mobile agent security , 2000, Comput. Commun..
[3] Radia J. Perlman,et al. Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.
[4] Deli Yang,et al. Research on Mobile Agent-based E-Commerce System Framework , 2004, ICEB.
[5] Danny B. Lange,et al. Mobile Objects and Mobile Agents: The Future of Distributed Computing? , 1998, ECOOP.
[6] Giovanni Pilato,et al. Biometric Features for Mobile Agents Ownership , 2004 .
[7] Aaron Kershenbaum,et al. Mobile Agents: Are They a Good Idea? , 1996, Mobile Object Systems.
[8] N. Balon. Preventing Attacks on Mobile Agents by Malicious Hosts , 2005 .
[9] Wayne Jansen,et al. NIST Special Publication 800-19 – Mobile Agent Security , 2000 .
[10] Christian F. Tschudin,et al. Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.
[11] G. Glass. ObjectSpace Voyager core package technical overview , 1999 .
[12] Rolf Oppliger. Security issues related to mobile code and agent-based systems , 1999, Comput. Commun..
[13] Fritz Hohl,et al. Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts , 1998, Mobile Agents and Security.
[14] Gian Pietro Picco,et al. Understanding code mobility , 1998, Proceedings of the 2000 International Conference on Software Engineering. ICSE 2000 the New Millennium.
[15] Paulo Marques,et al. Security mechanisms for using mobile agents in electronic commerce , 1999, Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems.
[16] Omer Mansoor Paracha. A Security Framework for Mobile Agent Systems , 2009 .