Data Security in Free Roaming Mobile Agents
暂无分享,去创建一个
[1] Lein Harn,et al. An Improved Free-Roaming Mobile Agent Security Protocol against Colluded Truncation Attacks , 2006, 30th Annual International Computer Software and Applications Conference (COMPSAC'06).
[2] Ed Dawson,et al. An Improved Forward Integrity Protocol for Mobile Agents , 2003, WISA.
[3] Cornelia Boldyreff,et al. Mobile agent fault tolerance for information retrieval applications: an exception handling approach , 2003, The Sixth International Symposium on Autonomous Decentralized Systems, 2003. ISADS 2003..
[4] Wolfgang Faber,et al. Plan reversals for recovery in execution monitoring , 2004, NMR.
[5] Zizette Boufaïda,et al. TAMAP: a new trust-based approach for mobile agent protection , 2007, Journal in Computer Virology.
[6] Ralph Deters,et al. Improving fault-tolerance by replicating agents , 2002, AAMAS '02.
[7] Radu Popescu-Zeletin,et al. Mobile Agent-Based Transaction in Open Environments , 2000 .
[8] A. Unruh,et al. Semantic-compensation-based recovery in multi-agent systems , 2005, IEEE 2nd Symposium on Multi-Agent Security and Survivability, 2005..
[9] Zhengyou Xia,et al. Defend mobile agent against malicious hosts in migration itineraries , 2004, Microprocess. Microsystems.
[10] Shane Balfe,et al. Mobile Agents and the Deus Ex Machina , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).
[11] Wang Feng-rui. Differential evolution algorithm for location management problem of mobile computing , 2008 .
[12] Ichiro Satoh. Mobile Agent Technology , 2001 .
[13] Karen L. Myers,et al. The SPARK agent framework , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..
[14] Pádraig Cunningham,et al. Software agents: A review , 1997 .