Promoting the development of secure mobile agent applications
暂无分享,去创建一个
Carles Garrigues | Guillermo Navarro-Arribas | Joan Borrell | Sergi Robles | G. Navarro-Arribas | S. Robles | J. Borrell | Carles Garrigues
[1] Fritz Hohl. A Model of Attacks of Malicious Hosts Against Mobile Agents , 1998, ECOOP Workshops.
[2] Samuel Pierre,et al. A security protocol for mobile agents based upon the cooperation of sedentary agents , 2007, J. Netw. Comput. Appl..
[3] David D. Langan,et al. A pattern-based development tool for mobile agents , 2005, SIGCSE.
[4] Yasushi Kambayashi,et al. A Functional Language for Mobile Agents with Dynamic Extension , 2004, KES.
[5] Danny B. Lange,et al. Seven good reasons for mobile agents , 1999, CACM.
[6] Giovanni Vigna,et al. Protecting Mobile Agents through Tracing , 1997 .
[7] Robert Wahbe,et al. Efficient software-based fault isolation , 1994, SOSP '93.
[8] D. Lessner. Computer Science Education on High Schools , 2010 .
[9] Javier López,et al. Analysis of a free roaming agent result-truncation defense scheme , 2004, Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004..
[10] Anand R. Tripathi,et al. Security in the Ajanta mobile agent system , 2001, Softw. Pract. Exp..
[11] David D. Langan,et al. A pattern-based development tool for mobile agents , 2005 .
[12] Joan Borrell,et al. Protecting Mobile Agent Itineraries , 2003, MATA.
[13] Agostino Poggi,et al. Developing Multi-agent Systems with JADE , 2007, ATAL.
[14] Vasant Honavar,et al. Towards the automatic generation of mobile agents for distributed intrusion detection system , 2006, J. Syst. Softw..
[15] Doug Baldwin,et al. Proceedings of the 36th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2005, St. Louis, Missouri, USA, February 23-27, 2005 , 2005, SIGCSE.
[16] Carles Garrigues,et al. Protecting mobile agents from external replay attacks , 2009, J. Syst. Softw..
[17] Sergi Robles,et al. Self-protected mobile agents , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..
[18] Tainchi Lu,et al. Mobile agents for information retrieval in hybrid simulation environment , 2007, J. Netw. Comput. Appl..
[19] Riccardo Sisto,et al. A configurable mobile agent data protection protocol , 2003, AAMAS '03.
[20] Bennet S. Yee,et al. Using Secure Coprocessors , 1994 .
[21] Fabio Bellifemine,et al. Developing Multi-Agent Systems with JADE (Wiley Series in Agent Technology) , 2007 .
[22] Jorge C. A. de Figueiredo,et al. An approach to modelling and applying mobile agent design patterns , 2004, SOEN.
[23] William M. Farmer,et al. Security for Mobile Agents: Issues and Requirements , 1996 .
[24] Marcelo R. Campo,et al. Simplifying Mobile Agent Development through Reactive Mobility by Failure , 2002, SBIA.
[25] S. Ilarri,et al. Comparison and Performance Evaluation of Mobile Agent Platforms , 2007, Third International Conference on Autonomic and Autonomous Systems (ICAS'07).
[26] Damianos Gavalas,et al. A mobile agent platform for distributed network and systems management , 2009, Journal of Systems and Software.
[27] Qusay H. Mahmoud,et al. Making Software Agents User-Friendly , 2006, Computer.
[28] Akihiko Ohsuga,et al. Mobile agent security with the IPEditor development tool and the mobile UNITY language , 2001, AGENTS '01.
[29] Volker Roth,et al. Empowering Mobile Software Agents , 2002, Mobile Agents.
[30] Michael Luck,et al. AAMAS '03: Proceedings of the Second International Joint Conference on Autonomous Agents and Multiagent Systems , 2003 .
[31] Carles Garrigues Olivella,et al. Securing dynamic itineraries for mobile agent applications , 2008 .
[32] Akihiko Ohsuga,et al. Agent system development method based on agent patterns , 1999, Proceedings of the 1999 International Conference on Software Engineering (IEEE Cat. No.99CB37002).
[33] Volker Roth,et al. Secure Recording of Itineraries through Co-operating Agents , 1998, ECOOP Workshops.
[34] Rami Bahsoon,et al. Requirements for Evaluating Architectural Stability , 2006, IEEE International Conference on Computer Systems and Applications, 2006..
[35] Helen D. Karatza,et al. Brute force web search for wireless devices using mobile agents , 2004, J. Syst. Softw..