Mobile Agents System Security
暂无分享,去创建一个
[1] Aaron Kershenbaum,et al. Mobile Agents: Are They a Good Idea? , 1996, Mobile Object Systems.
[2] Zahir Tari,et al. A Role-Based Access Control for Intranet Security , 1997, IEEE Internet Comput..
[3] Eduardo Mena,et al. SPRINGS: a scalable platform for highly mobile agents in distributed computing environments , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[4] Jeffrey M. Bradshaw,et al. Path-Based Security for Mobile Agents , 2002, SEMAS.
[5] Luc Moreau,et al. Mobile Code For Key Propagation , 2002, SEMAS.
[6] Robbert van Renesse,et al. An Introduction to the TACOMA Distributed System , 2006 .
[7] Daniel Hagimont,et al. A performance evaluation of the mobile agent paradigm , 1999, OOPSLA '99.
[8] B. Soh,et al. Authenticating mobile agent platforms using signature chaining without trusted third parties , 2005, 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service.
[9] Jose L. Muñoz,et al. A protocol for detecting malicious hosts based on limiting the execution time of mobile agents , 2003, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003.
[10] Dejan S. Milojicic,et al. Mobile Objects and Agents (MOA) , 1998, Distributed Syst. Eng..
[11] Ramon Martí,et al. Enabling Mobile Agents Interoperability Through FIPA Standards , 2006, CIA.
[12] Walter Binder,et al. Portable Resource Reification in Java-Based Mobile Agent Systems , 2001, Mobile Agents.
[13] Vijay Varadharajan,et al. A Security Architecture for Mobile Agent Based Applications , 2004, World Wide Web.
[15] Oliver A. McBryan,et al. An Overview of Message Passing Environments , 1994, Parallel Comput..
[16] R. Al-Jaljouli,et al. Secure Mobile Agent-based E-Negotiation for On-Line Trading , 2007, 2007 IEEE International Symposium on Signal Processing and Information Technology.
[17] Umit Topaloglu,et al. Secure mobile agent execution in virtual environment , 2008, Autonomous Agents and Multi-Agent Systems.
[18] William M. Farmer,et al. Security for Mobile Agents: Issues and Requirements , 1996 .
[19] Edwin K. P. Chong,et al. Efficient multicast packet authentication using signature amortization , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[20] Luís Valente,et al. Mobile agent security and Telescript , 1996, COMPCON '96. Technologies for the Information Superhighway Digest of Papers.
[21] Koen De Bosschere,et al. Program obfuscation: a quantitative approach , 2007, QoP '07.
[22] László Gulyás,et al. An Overview of Mobile Software Systems , 2000 .
[23] Moti Yung,et al. Sliding Encryption: A Cryptographic Tool for Mobile Agents , 1997, FSE.
[24] C. Chellappan,et al. Identifying the split personality of the malicious host in the mobile agent environment , 2008, 2008 4th International IEEE Conference Intelligent Systems.
[25] Daniel Serrano,et al. Protecting agents from malicious hosts using TPM , 2009, Int. J. Comput. Sci. Appl..
[26] Marco Caccamo,et al. Sandboxing Controllers for Cyber-Physical Systems , 2011, 2011 IEEE/ACM Second International Conference on Cyber-Physical Systems.
[27] Noopur Katre,et al. Trusted third party for data security in cloud environment , 2016, 2016 2nd International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB).
[28] C. Jayakumar,et al. PROTECTION OF FREE ROAMING MOBILE AGENTS USING CUSTOMIZED ROOT CANAL ALGORITHM AGAINST MALICIOUS HOST ATTACKS , 2014 .
[29] Azizah Abdul Rahman,et al. Signature-based Multi-Layer Distributed Intrusion Detection System using Mobile Agents , 2013, Int. J. Netw. Secur..
[30] Wilmuth Müller,et al. A Test Suite for the Evaluation of Mobile Agent Platform Security , 2006, 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology.
[31] Fritz Hohl,et al. Mole – Concepts of a mobile agent system , 1999, World Wide Web.
[32] Bent Thomsen,et al. Mobile Agents—The new paradigm in computing , 1997 .
[33] S. Ilarri,et al. Comparison and Performance Evaluation of Mobile Agent Platforms , 2007, Third International Conference on Autonomic and Autonomous Systems (ICAS'07).
[34] Vijay Sureshkumar. Java security , 1998 .
[35] C. Chellappan,et al. Performance analysis of mobile agent failure recovery in e-service applications , 2010, Comput. Stand. Interfaces.
[36] Rolf Oppliger. Security issues related to mobile code and agent-based systems , 1999, Comput. Commun..
[37] Paolo Bellavista,et al. Mobeyes: smart mobs for urban monitoring with a vehicular sensor network , 2006, IEEE Wireless Communications.
[38] Luca Cardelli,et al. A language with distributed scope , 1995, POPL '95.
[39] Marianne Swanson,et al. Security metrics guide for information technology systems , 2003 .
[40] Ming-Bo Lin. New path history management circuits for Viterbi decoders , 2000, IEEE Trans. Commun..
[41] Antonio Maña,et al. TPM-based protection for mobile agents , 2011, Secur. Commun. Networks.
[42] Ichiro Satoh,et al. Building reusable mobile agents for network management , 2003, IEEE Trans. Syst. Man Cybern. Part C.
[43] Jun Liu,et al. A Novel Free-Roaming Mobile Agent Security Mechanism by Trusted Computing Technology , 2008, 2008 International Conference on Computer Science and Software Engineering.
[44] Wayne A. Jansen,et al. Mobile Agent Security , 1999 .
[45] G. C. Nandi,et al. Protection of mobile agent and its itinerary from malicious host , 2011, 2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011).
[46] Jon Ølnes,et al. Mobile Agent Security - Issues and Directions , 1999, IS&N.
[47] C. Chellappan,et al. Protection of Mobile Agent Platform through Attack Identification Scanner (AIS) by Malicious Identification Police (MIP) , 2008, 2008 First International Conference on Emerging Trends in Engineering and Technology.
[48] Zahia Guessoum,et al. Using a Trust-Based Environment Key for Mobile Agent Code Protection , 2008 .
[49] Christian F. Tschudin,et al. Towards mobile cryptography , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[50] Moshe Kam,et al. Secure Mobile Agents on Ad Hoc Wireless Networks , 2003, IAAI.
[51] Gene Tsudik,et al. Itinerant Agents for Mobile Computing , 1995, IEEE Communications Surveys & Tutorials.
[52] David Wong,et al. Concordia: An Infrastructure for Collaborating Mobile Agents , 1997, Mobile Agents.
[53] Michael Sonntag,et al. Mobile agent security based on payment , 2000, OPSR.
[54] P. D. O'Brien,et al. FIPA — Towards a Standard for Software Agents , 1998 .
[55] Gora Chand Nandi,et al. Self-reliant mobile code: a new direction of agent security , 2014, J. Netw. Comput. Appl..
[56] Joann J. Ordille,et al. When agents roam, who can you trust? , 1996, Proceedings of COM'96. First Annual Conference on Emerging Technologies and Applications in Communications.
[57] Wilmuth Müller,et al. Evaluating the security of mobile agent platforms , 2009, Autonomous Agents and Multi-Agent Systems.
[58] Luis Moura Silva,et al. Comparing the performance of mobile agent systems: a study of benchmarking , 2000, Comput. Commun..
[59] Giovanni Vigna,et al. Cryptographic Traces for Mobile Agents , 1998, Mobile Agents and Security.
[60] Fritz Hohl,et al. Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts , 1998, Mobile Agents and Security.
[61] L. Badger,et al. Self-Protecting Mobile Agents Obfuscation Techniques Evaluation Report , 2002 .
[62] V.K. Wei,et al. A taxonomy for attacks on mobile agent , 2001, EUROCON'2001. International Conference on Trends in Communications. Technical Program, Proceedings (Cat. No.01EX439).
[63] Holger Peine,et al. The Architecture of the Ara Platform for Mobile Agents , 1999, Mobile Agents.
[64] Niklas Borselius. Mobile agent security , 2002 .
[65] William M. Farmer,et al. Security for Mobile Agents: Authentication and State Appraisal , 1996, ESORICS.
[66] Daniel C. DuVarney,et al. Model-carrying code: a practical approach for safe execution of untrusted applications , 2003, SOSP '03.
[67] Edin Arnautovic,et al. System Security Requirements Analysis:A Smart Grid Case Study , 2014, Syst. Eng..
[68] Miguel Mira da Silva,et al. An Overview of AgentSpace: A Next-Generation Mobile Agent System , 1998, Mobile Agents.
[69] El Mamoun Souidi,et al. Security of Mobile Agent Platforms Using Access Control and Cryptography , 2015, KES-AMSTA.
[70] Daniela Rus,et al. Market-based resource control for mobile agents , 1998, AGENTS '98.
[72] Cátia Santos-Pereira,et al. A secure RBAC mobile agent access control model for healthcare institutions , 2013, Proceedings of the 26th IEEE International Symposium on Computer-Based Medical Systems.
[73] Victor K.-W. Wei,et al. Defenses against the Truncation of Computation Results of Free-Roaming Agents , 2002, ICICS.
[74] Giovanni Vigna,et al. Designing Distributed Applications with Mobile Code Paradigms , 1997, Proceedings of the (19th) International Conference on Software Engineering.
[75] Matthias Reich,et al. Integrating mobile agents into the mobile middleware , 2005, Personal Technologies.
[76] Steve Vinoski,et al. CORBA: integrating diverse applications within distributed heterogeneous environments , 1997, IEEE Commun. Mag..
[77] C. Chellappan,et al. Protecting free-roaming mobile agent against multiple colluded truncation attacks , 2007, MobiMedia.
[78] Salima Hacini. Using dynamic adaptability to protect mobile agents code , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[79] Levente Buttyán,et al. Introducing Trusted Third Parties to the Mobile Agent Paradigm , 2001, Secure Internet Programming.
[80] Ciarán Bryce. A Security Framework for a Mobile Agent System , 2000, ESORICS.
[81] Bernhard Rinner,et al. Distributed embedded smart cameras for surveillance applications , 2006, Computer.
[82] Ljiljana Brankovic,et al. An Overview of Security Issues and Techniques in Mobile Agents , 2004, Communications and Multimedia Security.
[83] Samuel Pierre,et al. A New Protocol for Protecting a Mobile Agent Using a Reference Clone , 2005, MATA.
[84] Arkady B. Zaslavsky,et al. Countering security vulnerabilities in agent execution using a self executing security examination , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..
[85] Sergi Robles,et al. An implementation of self-protected mobile agents , 2004, Proceedings. 11th IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, 2004..
[86] C. Stefanelli,et al. Mobile agents protection in the Internet environment , 1999, Proceedings. Twenty-Third Annual International Computer Software and Applications Conference (Cat. No.99CB37032).
[87] Ig Ibert Bittencourt,et al. A survey of security in multi-agent systems , 2012, Expert Syst. Appl..
[88] Abolfazl Esfandi,et al. Mobile agent security in multi agent environments using a multi agent-multi key approach , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.
[89] Eduardo Mena Nieto,et al. Mobile agents and mobile devices: friendship or difficult relationship? , 2009 .
[90] Wayne Jansen,et al. NIST Special Publication 800-19 – Mobile Agent Security , 2000 .
[91] Y. Yemini,et al. MarketNet: market-based protection of information systems , 1998, ICE '98.
[92] Dejan S. Milojicic,et al. MASIF: The OMG mobile agent system interoperability facility , 1998, Personal Technologies.
[93] Veljko M. Milutinovic,et al. Mobile Agents and Java Mobile Agents Toolkits , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[94] Audun Jøsang,et al. A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[95] José Neuman de Souza,et al. A Secure Mobile Agents Platform Based on a Peer-to-Peer Infrastructure , 2006, International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL'06).
[96] U. Wilhelm. Cryptographically Protected Objects , 1997 .
[97] Andy Ju An Wang. Information security models and metrics , 2005, ACM-SE 43.
[98] Wayne A. Jansen,et al. Countermeasures for mobile agent security , 2000, Comput. Commun..
[99] Volker Roth,et al. Access control and key management for mobile agents , 1998, Comput. Graph..
[100] Ivan Marsá-Maestre,et al. Mobile Agents for Service Personalization in Smart Environments , 2008, J. Networks.
[101] Lein Harn,et al. An Improved Free-Roaming Mobile Agent Security Protocol against Colluded Truncation Attacks , 2006, 30th Annual International Computer Software and Applications Conference (COMPSAC'06).
[102] Israel Ben-Shaul,et al. Dynamic layout of distributed applications in FarGo , 1999, Proceedings of the 1999 International Conference on Software Engineering (IEEE Cat. No.99CB37002).
[103] Ahmed Karmouch,et al. Mobile software agents: an overview , 1998, IEEE Commun. Mag..
[104] Amirreza Masoumzadeh,et al. A survey of security issue in multi-agent systems , 2011, Artificial Intelligence Review.
[105] David M. Chess,et al. Security Issues in Mobile Code Systems , 1998, Mobile Agents and Security.
[106] Jose L. Muñoz,et al. Punishing manipulation attacks in mobile agent systems , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[107] Jianwei Niu,et al. Rethinking Security Requirements in RE Research , 2014 .
[108] Hasan Omar Al-Sakran,et al. Intelligent Traffic Information System Based on Integration of Internet of Things and Agent Technology , 2015 .
[109] Jose L. Muñoz,et al. Mobile Agent Watermarking and Fingerprinting: Tracing Malicious Hosts , 2003, DEXA.
[110] Adel Aneiba,et al. MOBILE AGENTS TECHNOLOGY AND MOBILITY , 2004 .
[111] Stuart Haber,et al. How to time-stamp a digital document , 1990, Journal of Cryptology.
[112] Wayne A. Jansen,et al. Determining privileges of mobile agents , 2001, Seventeenth Annual Computer Security Applications Conference.
[113] Nicolas Lhuillier,et al. FOUNDATION FOR INTELLIGENT PHYSICAL AGENTS , 2003 .
[114] Volker Roth,et al. Secure Recording of Itineraries through Co-operating Agents , 1998, ECOOP Workshops.
[115] Anne T. Nguyen,et al. Protecting Mobile Agents against Malicious Hosts in an Internet-based E-commerce Environment , 2003 .
[116] David Kotz,et al. Mobile agents and the future of the internet , 1999, OPSR.
[117] Gian Pietro Picco. µCODE: A Lightweight and Flexible Mobile Code Toolkit , 1998, Mobile Agents.
[118] Tarig Mohamed Ahmed. Using Secure-Image Mechanism to Protect Mobile Agent Against Malicious Hosts , 2009 .
[119] Magdy Saeb,et al. Protecting Mobile Agents against Malicious Host Attacks Using Threat Diagnostic AND/OR Tree , 2003 .
[120] G. Geetha,et al. Secure Communication Protocol for Protecting Computation Result of Free Roaming Mobile Agent , 2014, J. Comput. Sci..
[121] David K. Gifford,et al. Implementing Remote Evaluation , 1990, IEEE Trans. Software Eng..
[122] George Cybenko,et al. D'Agents: Security in a Multiple-Language, Mobile-Agent System , 1998, Mobile Agents and Security.
[123] Xavier Leroy,et al. Java Bytecode Verification: Algorithms and Formalizations , 2003, Journal of Automated Reasoning.
[124] Mehdi Jazayeri,et al. Gypsy: a component-based mobile agent system , 2000, Proceedings 8th Euromicro Workshop on Parallel and Distributed Processing.
[125] Jan Fabian Ehmke,et al. A mathematical programming technique for matching time-stamped records in logistics and transportation systems , 2016 .
[126] D. Richard Kuhn,et al. Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems , 1997, RBAC '97.
[127] P. Marikkannu,et al. A Secure Mobile Agent System against Tailgating Attacks , 2011 .
[128] B. R. Badrinath,et al. M-RPC: a remote procedure call service for mobile clients , 1995, MobiCom '95.
[129] Giovanni Vigna,et al. Protecting Mobile Agents through Tracing , 1997 .
[130] Robert Wahbe,et al. Efficient software-based fault isolation , 1994, SOSP '93.
[131] Christian F. Tschudin,et al. Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.
[132] Ayman I. Kayssi,et al. Trends in Mobile Agent Applications , 2005, J. Res. Pract. Inf. Technol..
[133] Ramandeep Kaur,et al. Integrated Mechanism to Prevent Agent Blocking in Secure Mobile Agent Platform System , 2010, 2010 International Conference on Advances in Computer Engineering.
[134] Richard Ssekibuule,et al. MOBILE AGENT SECURITY AGAINST MALICIOUS PLATFORMS , 2010, Cybern. Syst..
[135] Levent Ertaul,et al. Mobile Agent Security , 2006, Security and Management.
[136] Jiann-I Pan,et al. Secure Mobile Agent for Telemedicine Based on P2P Networks , 2013, Journal of Medical Systems.
[137] Hassan Babiker,et al. Artificial Immune System Based Data Miner , 2011 .
[138] Tony White,et al. Mobile agents for network management , 1998, IEEE Communications Surveys & Tutorials.
[139] Volker Roth,et al. Mutual Protection of Co-operating Agents , 2001, Secure Internet Programming.
[140] Danny B. Lange,et al. Seven good reasons for mobile agents , 1999, CACM.
[141] H. Raghav Rao,et al. Security in grid computing: A review and synthesis , 2008, Decis. Support Syst..
[142] Danny B. Lange,et al. Programming and Deploying Java¿ Mobile Agents with Aglets¿ , 1998 .
[143] Xiaogang Wang,et al. A Free-Roaming Mobile Agent Security Protocol Based on Anonymous Onion Routing and k Anonymous Hops Backwards , 2008, ATC.
[144] Frances M. T. Brazier,et al. A Security Framework for a Mobile Agent System , 2002 .
[145] Giovanna Di Marzo Serugendo,et al. Messenger-Based Operating Systems , 1994 .
[146] Jian Lu,et al. Path-history-based access control for mobile agents , 2006, Int. J. Parallel Emergent Distributed Syst..
[147] Daniel M. Zimmerman,et al. benefits and drawbacks of current Java mobile agent systems , 1997 .
[148] Gora Chand Nandi,et al. Fragmentation based encryption approach for self protected mobile agent , 2014, J. King Saud Univ. Comput. Inf. Sci..
[149] John K. Ousterhout,et al. The Safe-Tcl Security Model , 1998, USENIX Annual Technical Conference.
[150] Thomas Magedanz,et al. Mobile agents - enabling technology for active intelligent network implementation , 1998, IEEE Netw..
[151] William M. Daley,et al. Security Requirements for Cryptographic Modules , 1999 .
[152] Akihiko Ohsuga,et al. PLANGENT: An Approach to Making Mobile Agents Intelligent , 1997, IEEE Internet Comput..
[153] Jim Alves-Foss,et al. The use of encrypted functions for mobile agent security , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[154] Sergi Robles,et al. Self-protected mobile agents , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..
[155] Ahmed Sameh Mohamed,et al. Security in mobile agent systems , 2002, Proceedings 2002 Symposium on Applications and the Internet (SAINT 2002).
[156] A. Sengupta,et al. A formal approach to information security metrics , 2012, 2012 Third International Conference on Emerging Applications of Information Technology.
[157] George C. Necula,et al. Research on proof-carrying code for mobile-code security , 1997 .
[158] N. Asokan,et al. Protecting the computation results of free-roaming agents , 2005, Personal Technologies.
[159] A. Majumdar,et al. Interpreting Opacity in the Context of Information-hiding and Obfuscation in Distributed Systems , 2006, TENCON 2006 - 2006 IEEE Region 10 Conference.
[160] David Wong,et al. Java-based mobile agents , 1999, CACM.
[161] Samuel Pierre,et al. A security protocol for mobile agents based upon the cooperation of sedentary agents , 2007, J. Netw. Comput. Appl..
[162] Kamlesh Dutta,et al. On the approach of combining trust and security for securing mobile agents: Trust enhanced security , 2011, 2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011).
[163] Samuel Pierre,et al. Protection of a mobile agent with a reference clone , 2006, Comput. Commun..
[164] Fritz Hohl,et al. A framework to protect mobile agents by using reference states , 2000, Proceedings 20th IEEE International Conference on Distributed Computing Systems.
[165] Jack W. Davidson,et al. Protection of software-based survivability mechanisms , 2003, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[166] Robert S. Gray,et al. Agent Tcl: a Exible and Secure Mobile-agent System , 1996 .
[167] Scott Oaks,et al. Java Security , 1998 .
[168] Ahmed Mohamed. Generate Sub-Agent Mechanism to protect mobile agent privacy , 2012 .
[169] Joan Borrell,et al. Agent Migration over FIPA ACL Messages , 2003, MATA.
[170] Jiannong Cao,et al. Mobile Agents and Applications in Networking and Distributed Computing , 2012, Mobile Agents in Networking and Distributed Computing.
[171] George Cybenko,et al. Mobile agents for mobile computing , 1996 .
[172] Ramachandran Baskaran,et al. Artificial immune system based mobile agent platform protection , 2013, Comput. Stand. Interfaces.
[173] Shan Liang,et al. Mobile Agent Protection with Self-Modifying Code , 2011, J. Signal Process. Syst..
[174] Fritz Hohl,et al. A protocol to detect malicious hosts attacks by using reference states , 1999 .
[175] T. Purusothaman,et al. AFDB security protocol against colluded truncation attack in free roaming mobile agent environment , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).
[176] Bennet S. Yee. A Sanctuary for Mobile Agents , 2001, Secure Internet Programming.
[177] Bruce Schneier,et al. Environmental Key Generation Towards Clueless Agents , 1998, Mobile Agents and Security.
[178] Charles J. Petrie,et al. JATLite: A Java Agent Infrastructure with Message Routing , 2000, IEEE Internet Comput..
[179] Zhifeng Xiao,et al. Security and Privacy in Cloud Computing , 2013, IEEE Communications Surveys & Tutorials.
[180] Mona M. Nasr. A proposed paradigm for tracing the effect of security threats in various mobile agent systems , 2015, 2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW).
[181] Leila Ismail,et al. Evaluation of Authentication Mechanisms for Mobile Agents on top of Java , 2007, 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007).
[182] Fred B. Schneider,et al. Towards Fault-Tolerant and Secure Agentry , 1997, WDAG.
[183] Robbert van Renesse,et al. Operating system support for mobile agents , 1995, Proceedings 5th Workshop on Hot Topics in Operating Systems (HotOS-V).
[184] Daniel Rixen,et al. General framework for transfer path analysis: History, theory and classification of techniques $ , 2016 .
[185] Anand R. Tripathi,et al. Security in the Ajanta mobile agent system , 2001, Softw. Pract. Exp..
[186] Jeffrey M. Bradshaw,et al. Strong Mobility and Fine-Grained Resource Control in NOMADS , 2000, ASA/MA.
[187] Xining Li. The Role of Mobile Agents in M-commerce , 2007 .
[188] J. C. Byington,et al. Mobile agents and security , 1998, IEEE Commun. Mag..
[189] Yang Gao,et al. Secure cloud storage based on cryptographic techniques , 2012 .
[190] Theodore A. Tsiligiridis,et al. Security for Mobile Agents: Privileges and State Appraisal Mechanism , 2004, Neural Parallel Sci. Comput..
[191] Anand R. Tripathi,et al. Design issues in mobile agent programming systems , 1998, IEEE Concurr..
[192] Rocco De Nicola,et al. XKlaim and Klava: Programming Mobile Code , 2002, TOSCA.
[193] Ramon Martí,et al. Secure Integration of Distributed Medical Data Using Mobile Agents , 2006, IEEE Intelligent Systems.
[194] Marta Mattoso,et al. Odyssey-Search: A multi-agent system for component information search and retrieval , 2006, J. Syst. Softw..
[195] Tarig Mohamed Ahmed. Generate Sub-Agent Mechanism to protect mobile agent privacy , 2012, 2012 IEEE Symposium on Computers & Informatics (ISCI).
[196] Steven Guan,et al. Integrity protection for Code-on-Demand mobile agents in e-commerce , 2002, J. Syst. Softw..
[197] Junmo Xiao,et al. A novel free-roaming mobile agent security protocol against colluded truncation attacks , 2008, 2008 International Conference on Information and Automation.
[198] Vipin Swarup,et al. Authentication for Mobile Agents , 1998, Mobile Agents and Security.
[199] Mayank Dave,et al. Rescuing data of mobile agents blocked by malicious hosts in e-service applications , 2011, 2011 International Conference on Multimedia, Signal Processing and Communication Technologies.
[200] Antonio Maña,et al. A Hardware Based Infrastructure for Agent Protection , 2009 .
[201] Maria Indrawan,et al. Security Aspects of Software Agents in Pervasive Information Systems , 2003 .
[202] H. Ishwaran,et al. Radiation and Dual Checkpoint Blockade Activates Non-Redundant Immune Mechanisms in Cancer , 2015, Nature.
[203] Yu-Fang Chung,et al. Deployment of Secure Mobile Agents for Medical Information Systems , 2012, Journal of Medical Systems.
[204] Ladislau Bölöni,et al. The Bond Agent System and Applications , 2000, ASA/MA.
[205] Danny B. Lange,et al. Mobile agents with Java: The Aglet API , 1998, World Wide Web.