Security for Mobile Agents
暂无分享,去创建一个
Akihiko Ohsuga | Yasuyuki Tahara | Shinichi Honiden | Nobukazu Yoshioka | S. Honiden | Yasuyuki Tahara | Akihiko Ohsuga | Nobukazu Yoshioka
[1] George C. Necula,et al. Safe, Untrusted Agents Using Proof-Carrying Code , 1998, Mobile Agents and Security.
[2] Elizabeth A. Kendall,et al. The layered agent pattern language , 1997 .
[3] Danny B. Lange,et al. Agent design patterns: elements of agent application design , 1998, AGENTS '98.
[4] Akihiko Ohsuga,et al. Agent system development method based on agent patterns , 1999, Proceedings of the 1999 International Conference on Software Engineering (IEEE Cat. No.99CB37002).
[5] Giovanni Vigna,et al. Cryptographic Traces for Mobile Agents , 1998, Mobile Agents and Security.
[6] Vipin Swarup,et al. Authentication for Mobile Agents , 1998, Mobile Agents and Security.
[7] David M. Chess,et al. Security Issues in Mobile Code Systems , 1998, Mobile Agents and Security.
[8] Christian F. Tschudin,et al. Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.
[9] Fritz Hohl,et al. Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts , 1998, Mobile Agents and Security.
[10] Robert Tolksdorf,et al. Coordinating Patterns of Mobile Information Agents , 1998, CIA.
[11] John K. Ousterhout,et al. The Safe-Tcl Security Model , 1998, USENIX Annual Technical Conference.