The Harpoon security system for helper programs on a Pocket Companion
暂无分享,去创建一个
[1] Aaron Kershenbaum,et al. Mobile Agents: Are They a Good Idea? , 1996, Mobile Object Systems.
[2] Antony Courtney,et al. Phantom: An Interpreted Language for Distributed Programming , 1995, COOTS.
[3] Andrew S. Tanenbaum,et al. The Design of a Capability-Based Distributed Operating System , 1986, Comput. J..
[4] Ian Goldberg,et al. A Secure Environment for Untrusted Helper Applications ( Confining the Wily Hacker ) , 1996 .
[5] Karl N. Levitt,et al. MCF: a malicious code filter , 1995, Comput. Secur..
[6] Daniela Rus,et al. Transportable agents support worldwide applications , 1996, EW 7.
[7] Dan S. Wallach,et al. Java security: from HotJava to Netscape and beyond , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[8] Gunnar Hartvigsen,et al. The Virtual Secretary Architecture for Secure Software Agents , 1996 .
[9] Ken Thompson,et al. The use of name spaces in Plan 9 , 1993, OPSR.
[10] Nathaniel S. Borenstein,et al. EMail With A Mind of Its Own: The Safe-Tcl Language for Enabled Mail , 1994, ULPAA.
[11] Teresa F. Lunt,et al. A survey of intrusion detection techniques , 1993, Comput. Secur..
[12] Tage Stabell-Kulo,et al. Off-line Delegation in a File Repository , 1996 .