Security issues in mobile agent technology
暂无分享,去创建一个
Antonio Corradi | Cesare Stefanelli | Rebecca Montanari | Antonio Corradi | R. Montanari | C. Stefanelli
[1] Li Gong,et al. Java security: present and near future , 1997, IEEE Micro.
[2] Emil C. Lupu,et al. A policy based role object model , 1997, Proceedings First International Enterprise Distributed Object Computing Workshop.
[3] N. Asokan,et al. Protecting the computation results of free-roaming agents , 1998, Personal Technologies.
[4] Levente Buttyán,et al. On the Problem of Trust in Mobile Agent Systems , 1998, NDSS.
[5] James Riely,et al. Type-Safe Execution of Mobile Agents in Anonymous Networks , 1998, ECOOP Workshops.
[6] Antonio Corradi,et al. Locality abstractions and security models in a mobile agent environment , 1998, Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253).
[7] Anand R. Tripathi,et al. Mobile agent programming in Ajanta , 1999, Proceedings. 19th IEEE International Conference on Distributed Computing Systems (Cat. No.99CB37003).
[8] Antonio Corradi,et al. Mobile agents and security: protocols for integrity , 1999, DAIS.
[9] Bennet S. Yee. A Sanctuary for Mobile Agents , 2001, Secure Internet Programming.