TPM-based protection for mobile agents
暂无分享,去创建一个
[1] Sebastian Mödersheim,et al. The AVISS Security Protocol Analysis Tool , 2002, CAV.
[2] Christian S. Collberg,et al. Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection , 2002, IEEE Trans. Software Eng..
[3] John K. Ousterhout,et al. Scripting: Higher-Level Programming for the 21st Century , 1998, Computer.
[4] Richard R. Brooks,et al. Mobile code paradigms and security issues , 2004, IEEE Internet Computing.
[5] Robert S. Gray,et al. Agent Tcl: a Exible and Secure Mobile-agent System , 1996 .
[6] Joann J. Ordille,et al. When agents roam, who can you trust? , 1996, Proceedings of COM'96. First Annual Conference on Emerging Technologies and Applications in Communications.
[7] Bennet S. Yee. A Sanctuary for Mobile Agents , 2001, Secure Internet Programming.
[8] D. Seret,et al. A comparative study of security protocols validation tools: HERMES vs. AVISPA , 2006, 2006 8th International Conference Advanced Communication Technology.
[9] Robert Wahbe,et al. Efficient software-based fault isolation , 1994, SOSP '93.
[10] Stuart Haber,et al. How to time-stamp a digital document , 1990, Journal of Cryptology.
[11] George C. Necula,et al. Proof-carrying code , 1997, POPL '97.
[12] William M. Farmer,et al. Security for Mobile Agents: Authentication and State Appraisal , 1996, ESORICS.
[13] Gene Tsudik,et al. Itinerant Agents for Mobile Computing , 1995, IEEE Communications Surveys & Tutorials.
[14] Fred B. Schneider,et al. Towards Fault-Tolerant and Secure Agentry , 1997, WDAG.
[15] David K. Gifford,et al. Remote evaluation , 1990, TOPL.
[16] Daniel Serrano,et al. Towards Secure Agent Computing for Ubiquitous Computing and Ambient Intelligence , 2007, UIC.