A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems
暂无分享,去创建一个
Jose L. Muñoz | Oscar Esparza | Jorge Mata-Díaz | Juan J. Alins-Delgado | Marc Jaimez | O. Esparza | J. L. Muñoz | Jorge Mata-Díaz | Marc Jaimez
[1] J. C. Byington,et al. Mobile agents and security , 1998, IEEE Commun. Mag..
[2] Wayne Jansen,et al. NIST Special Publication 800-19 – Mobile Agent Security , 2000 .
[3] Rolf Oppliger. Security issues related to mobile code and agent-based systems , 1999, Comput. Commun..
[4] Peter Van Roy,et al. Programming languages for distributed applications , 2009, New Generation Computing.
[5] Wayne A. Jansen,et al. Countermeasures for mobile agent security , 2000, Comput. Commun..
[6] Jose L. Muñoz,et al. Implementation and Performance Evaluation of a Protocol for Detecting Suspicious Hosts , 2003, MATA.
[7] Joan Borrell,et al. Protecting Mobile Agent Itineraries , 2003, MATA.
[8] Volker Roth,et al. Mutual Protection of Co-operating Agents , 2001, Secure Internet Programming.
[9] Levente Buttyán,et al. Introducing Trusted Third Parties to the Mobile Agent Paradigm , 2001, Secure Internet Programming.
[10] E. Horlait. Mobile Agents for Telecommunication Applications , 2003, Lecture Notes in Computer Science.
[11] Rolf Oppliger,et al. Advanced security techniques for network protection , 2000, Comput. Commun..
[12] Christian F. Tschudin,et al. Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.
[13] Andreu Riera,et al. Securing the itinerary of mobile agents through a non-repudiation protocol , 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303).
[14] Jan Vitek,et al. Secure Internet Programming , 1999 .
[15] Jose L. Muñoz,et al. Secure brokerage mechanisms for mobile electronic commerce , 2006, Comput. Commun..
[16] Wayne A. Jansen,et al. Mobile Agent Security , 1999 .
[17] José M. Troya,et al. A framework for secure execution of software , 2004, International Journal of Information Security.
[18] Fritz Hohl,et al. Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts , 1998, Mobile Agents and Security.
[19] Kam-Wing Ng,et al. Detection of Malicious Host Attacks by Tracing with Randomly Selected Hosts , 2004, EUC.
[20] Athanasios T. Karygiannis,et al. SP 800-19. Mobile Agent Security , 1999 .
[21] David Kinny,et al. Reliable Agent Communication — A pragmatic perspective , 2001, New Generation Computing.
[22] Dirk Westhoff,et al. Methods for Protecting a Mobile Agent's Route , 1999, ISW.
[23] Giovanni Vigna,et al. Cryptographic Traces for Mobile Agents , 1998, Mobile Agents and Security.
[24] Bennet S. Yee. A Sanctuary for Mobile Agents , 2001, Secure Internet Programming.
[25] Bruce Schneier,et al. Environmental Key Generation Towards Clueless Agents , 1998, Mobile Agents and Security.
[26] Samuel Pierre,et al. A security protocol for mobile agents based upon the cooperation of sedentary agents , 2007, J. Netw. Comput. Appl..
[27] Samuel Pierre,et al. Protection of a mobile agent with a reference clone , 2006, Comput. Commun..
[28] Fritz Hohl,et al. A framework to protect mobile agents by using reference states , 2000, Proceedings 20th IEEE International Conference on Distributed Computing Systems.
[29] Jose L. Muñoz,et al. Punishing malicious hosts with the cryptographic traces approach , 2006, New Generation Computing.