Secure Distributed Dossier Management in the Legal Domain
暂无分享,去创建一个
[1] A.S. Tanenbaum,et al. Security in a mobile agent system , 2004, IEEE First Symposium onMulti-Agent Security and Survivability, 2004.
[2] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[3] Michael Wooldridge,et al. Intelligent agents: theory and practice The Knowledge Engineering Review , 1995 .
[4] R. P. de Roode. M.R. Bruning, Over sommige kinderen moet je praten. Gegevensuitwisseling in de jeugdzorg (oratie Leiden), Leiden 2006 , 2007 .
[5] Michael Luck,et al. Agent technology: Enabling next generation computing , 2003 .
[6] Radia J. Perlman,et al. Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.
[7] Nicholas R. Jennings,et al. Intelligent agents: theory and practice , 1995, The Knowledge Engineering Review.
[8] Andrew C. Myers,et al. Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..
[9] Wolfgang Rankl,et al. Smart Card Handbook , 1997 .
[10] Radia Perlman,et al. Network Security , 2002 .
[11] Agostino Poggi,et al. Jade - a fipa-compliant agent framework , 1999 .
[12] Ross J. Anderson,et al. Clinical system security: interim guidelines , 1996, BMJ.
[13] Frances M. T. Brazier,et al. Scalable Middleware Environment for Agent-Based Internet Applications , 2004, PARA.
[14] Michael Luck,et al. Agent technology: Enabling next generation computing , 2003 .
[15] Volker Roth,et al. Concepts and architecture of a security-centric mobile agent server , 2001, Proceedings 5th International Symposium on Autonomous Decentralized Systems.
[16] M. R. Bruning. Over sommige kinderen moet je praten. Gegevensuitwisseling in de jeugdzorg , 2006 .