Anonymity services for multi-agent systems
暂无分享,去创建一个
[1] Giovanni Maria Sacco,et al. Timestamps in key distribution protocols , 1981, CACM.
[2] Frances M. T. Brazier,et al. Security of Distributed Digital Criminal Dossiers , 2008, J. Softw..
[3] D. Mobach. Agent-Based Mediated Service Negotiation , 2007 .
[4] Agostino Poggi,et al. Jade - a fipa-compliant agent framework , 1999 .
[5] Reinout van Schouwen. Design and implementation of a secure, decentralized location service for agent platforms , 2006 .
[6] Amnon Ta-Shma,et al. On Anonymous Electronic Cash and Crime , 1999, ISW.
[7] Martijn Warnier,et al. Organized Anonymous Agents , 2007 .
[8] L. Jean Camp,et al. Token and Notational Money in Electronic Commerce , 1995, USENIX Workshop on Electronic Commerce.
[9] José Meseguer,et al. Unwinding and Inference Control , 1984, 1984 IEEE Symposium on Security and Privacy.
[10] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[11] André Weimerskirch,et al. A Distributed Light-Weight Authentication Model for Ad-hoc Networks , 2001, ICISC.
[12] Corien Prins,et al. New Rules for Anonymous Electronic Transactions? An Exploration of the Private Law Implications of Digital Anonymity , 2001, Journal of Information, Law and Technology.
[13] Flavio D. Garcia,et al. Off-Line Karma: A Decentralized Currency for Peer-to-peer and Grid Applications , 2005, ACNS.
[14] Frances M. T. Brazier,et al. Design of a Secure and Decentralized Location Service for Agent Platforms , 2007, AP2PC.
[15] Frances M. T. Brazier,et al. A WS-Agreement Based Resource Negotiation Framework for Mobile Agents , 2006, Scalable Comput. Pract. Exp..
[16] Frances M. T. Brazier,et al. Anonymity and software agents: An interdisciplinary challenge , 2004, Artificial Intelligence and Law.
[17] Robert R. Moeller,et al. Network Security , 1993, Inf. Secur. J. A Glob. Perspect..
[18] Andreas Pfitzmann,et al. Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[19] Rafal Leszczyna,et al. Untraceability of mobile agents , 2005, AAMAS '05.
[20] Radia J. Perlman,et al. Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.
[21] Ronggong Song,et al. Anonymous Communications for Mobile Agents , 2002, MATA.
[22] Frances M. T. Brazier,et al. Web service access management for integration with agent systems , 2008, SAC '08.
[23] Michael Luck,et al. Agent technology: Enabling next generation computing , 2003 .
[24] Chris J. Mitchell,et al. Limits to Anonymity When Using Credentials , 2004, Security Protocols Workshop.
[25] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[26] Frances M. T. Brazier,et al. A Common Base for Building Secure Mobile Agent Middleware , 2007 .
[27] Volker Roth,et al. Concepts and architecture of a security-centric mobile agent server , 2001, Proceedings 5th International Symposium on Autonomous Decentralized Systems.
[28] Aaron Helsinger,et al. Cougaar: a scalable, distributed multi-agent architecture , 2004, 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583).
[29] Andrew C. Myers,et al. Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..
[30] Ziyan Maraikar. Resource and Service Discovery for Mobile Agent Platforms , 2006 .
[31] Andrei Serjantov,et al. On the anonymity of anonymity systems , 2004 .
[32] Michael P. Wellman,et al. The Michigan Internet AuctionBot: a configurable auction server for human and software agents , 1998, AGENTS '98.