Detection of Mobile Agent's Blocking in Secure Layered Architecture
暂无分享,去创建一个
[1] Bennet S. Yee. A Sanctuary for Mobile Agents , 2001, Secure Internet Programming.
[2] Bruce Schneier,et al. Environmental Key Generation Towards Clueless Agents , 1998, Mobile Agents and Security.
[3] Christian F. Tschudin,et al. Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.
[4] Wayne Jansen,et al. NIST Special Publication 800-19 – Mobile Agent Security , 2000 .
[5] Wayne A. Jansen,et al. Mobile Agent Security , 1999 .
[6] Moti Yung,et al. Sliding Encryption: A Cryptographic Tool for Mobile Agents , 1997, FSE.
[7] Fritz Hohl,et al. Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts , 1998, Mobile Agents and Security.
[8] Jianying Zhou,et al. Protecting mobile-agent data collection against blocking attacks , 2006, Comput. Stand. Interfaces.
[9] W. A. Jansen,et al. MOBILE AGENTS AND SECURITY , 1999 .
[10] Giovanni Vigna,et al. Protecting Mobile Agents through Tracing , 1997 .
[11] Robert S. Gray,et al. Agent Tcl: a Exible and Secure Mobile-agent System , 1996 .
[12] Niklas Borselius. Mobile agent security , 2002 .
[13] Jan Vitek,et al. Secure Internet Programming: Security Issues for Mobile and Distributed Objects , 1999 .
[14] Volker Roth,et al. Secure Recording of Itineraries through Co-operating Agents , 1998, ECOOP Workshops.
[15] Fritz Hohl. An Approach to Solve the Problem of Malicious Hosts , 1998 .
[16] Jim Alves-Foss,et al. The use of encrypted functions for mobile agent security , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.