Knowledge Based and Intelligent Information and Engineering Systems Security in Multi-Agent Systems
暂无分享,去创建一个
[1] Mohammad Khalid Pandit,et al. Applying Aspect Oriented Programming on Security , 2015 .
[2] Chris J. Mitchell,et al. On Mobile Agent Based Transactions in Moderately Hostile Environments , 2001, Network Security.
[3] Franco Zambonelli,et al. Developing multiagent systems: The Gaia methodology , 2003, TSEM.
[4] Haralambos Mouratidis,et al. Modelling secure multiagent systems , 2003, AAMAS '03.
[5] Lars Rasmusson,et al. Simulated social control for secure Internet commerce , 1996, NSPW '96.
[6] Gio Wiederhold,et al. Mediators in the architecture of future information systems , 1992, Computer.
[7] Esmiralda Moradian,et al. Software Security Engineering Monitoring and Control , 2011, ICSE 2011.
[8] Qi He,et al. Personal security agent: KQML-based PKI , 1998, AGENTS '98.
[9] Haralambos Mouratidis,et al. Multi-agent Systems and Security Requirements Analysis , 2003, SELMAS.
[10] William M. Farmer,et al. Security for Mobile Agents: Authentication and State Appraisal , 1996, ESORICS.
[11] Nicholas R. Jennings,et al. The Gaia Methodology for Agent-Oriented Analysis and Design , 2000, Autonomous Agents and Multi-Agent Systems.
[12] Nicholas R. Jennings,et al. Intelligent agents: theory and practice , 1995, The Knowledge Engineering Review.
[13] Stefan Poslad,et al. The FIPA-OS agent platform: Open Source for Open Standards , 2006 .
[14] Levente Buttyán,et al. On the Problem of Trust in Mobile Agent Systems , 1998, NDSS.
[15] Nicholas R. Jennings,et al. A methodology for agent-oriented analysis and design , 1999, AGENTS '99.
[16] Paulo S. C. Alencar,et al. Software Engineering for Multi-Agent Systems II , 2004 .
[17] A. Roadmapof. A Roadmap of Agent Research and Development , 1995 .
[18] Christian F. Tschudin,et al. Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.
[19] Esmiralda Moradian. Security of E-Commerce Software Systems , 2013 .
[20] Katia P. Sycara,et al. Adding security and trust to multiagent systems , 2000, Appl. Artif. Intell..
[21] Bennet S. Yee. A Sanctuary for Mobile Agents , 2001, Secure Internet Programming.
[22] Bruce Schneier,et al. Environmental Key Generation Towards Clueless Agents , 1998, Mobile Agents and Security.
[23] J. Galliers. A theoretical framework for computer models of cooperative dialogue, acknowledging multiagent conflict , 1988 .
[24] Tim Finin,et al. Secret Agents - A Security Architecture for the KQML Agent Communication Language , 1995, CIKM 1995.
[25] Agostino Poggi,et al. Developing Multi-agent Systems with JADE , 2007, ATAL.
[26] 所 真理雄,et al. ICMAS-96 : proceedings Second International Conference on Multi-Agent Systems, December 10-13, 1996, Kyoto, Japan , 1996 .
[27] M. Bouaziz,et al. An Introduction to Computer Security , 2012 .
[28] Niklas Borselius,et al. Security in Multi-Agent Systems , 2002 .
[29] Fritz Hohl,et al. Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts , 1998, Mobile Agents and Security.
[30] Barr and Feigenbaum Edward A. Avron,et al. The Handbook of Artificial Intelligence , 1981 .
[31] Jeffrey S. Rosenschein,et al. Deals Among Rational Agents , 1985, IJCAI.
[32] Bernard Burg,et al. Towards the deployment of an open Agent World , 2000, JFIADSMA.
[33] David Stuart Robertson,et al. A review of attacks and security approaches in open multi-agent systems , 2012, Artificial Intelligence Review.
[34] M. R. Genesereth,et al. Knowledge Interchange Format Version 3.0 Reference Manual , 1992, LICS 1992.
[35] Onn Shehory,et al. A Framework for Evaluating Agent-Oriented Methodologies , 2003, AOIS.
[36] Fred B. Schneider,et al. Towards Fault-Tolerant and Secure Agentry , 1997, WDAG.
[37] Stefan Poslad,et al. Towards improved trust and security in FIPA agent platforms , 2004 .
[38] Vesna Hassler,et al. Security Fundamentals for E-Commerce , 2000 .
[39] Franco Zambonelli,et al. Multi-agent Systems on the Internet: Extending the Scope of Coordination towards Security and Topology , 1999, MAAMAW.
[40] Amirreza Masoumzadeh,et al. A survey of security issue in multi-agent systems , 2011, Artificial Intelligence Review.
[41] Fritz Hohl. A Model of Attacks of Malicious Hosts Against Mobile Agents , 1998, ECOOP Workshops.
[42] Jeffrey M. Bradshaw,et al. An introduction to software agents , 1997 .