Security issues related to mobile code and agent-based systems
暂无分享,去创建一个
[1] Vipin Swarup,et al. Authentication for Mobile Agents , 1998, Mobile Agents and Security.
[2] George C. Necula,et al. Safe, Untrusted Agents Using Proof-Carrying Code , 1998, Mobile Agents and Security.
[3] Giovanni Vigna,et al. Cryptographic Traces for Mobile Agents , 1998, Mobile Agents and Security.
[4] Danny B. Lange,et al. A Security Model for Aglets , 1997, IEEE Internet Comput..
[5] David M. Chess,et al. Security Issues in Mobile Code Systems , 1998, Mobile Agents and Security.
[6] Carlo Ghezzi,et al. Analyzing Mobile Code Languages , 1996, Mobile Object Systems.
[7] Scott Oaks,et al. Java Security , 1998 .
[8] Fritz Hohl,et al. Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts , 1998, Mobile Agents and Security.
[9] Ken Thompson,et al. Reflections on trusting trust , 1984, CACM.
[10] Christian F. Tschudin,et al. Towards mobile cryptography , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[11] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[12] Martín Abadi,et al. Authentication in distributed systems: theory and practice , 1991, SOSP '91.
[13] John K. Ousterhout,et al. The Safe-Tcl Security Model , 1998, USENIX Annual Technical Conference.
[14] Geoffrey Smith,et al. Language Issues in Mobile Program Security , 1998, Mobile Agents and Security.
[15] Christian F. Tschudin,et al. Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.
[16] Danny B. Lange,et al. Programming and Deploying Java¿ Mobile Agents with Aglets¿ , 1998 .
[17] George Cybenko,et al. D'Agents: Security in a Multiple-Language, Mobile-Agent System , 1998, Mobile Agents and Security.