Security in Multi-Agent Systems
暂无分享,去创建一个
[1] M. R. Genesereth,et al. Knowledge Interchange Format Version 3.0 Reference Manual , 1992, LICS 1992.
[2] Levente Buttyán,et al. On the Problem of Trust in Mobile Agent Systems , 1998, NDSS.
[3] Vesna Hassler,et al. Security Fundamentals for E-Commerce , 2000 .
[4] Bernard Burg,et al. Towards the deployment of an open Agent World , 2000, JFIADSMA.
[5] Tim Finin,et al. Secret Agents - A Security Architecture for the KQML Agent Communication Language , 1995, CIKM 1995.
[6] Lars Rasmusson,et al. Simulated social control for secure Internet commerce , 1996, NSPW '96.
[7] Nicholas R. Jennings,et al. Intelligent agents: theory and practice , 1995, The Knowledge Engineering Review.
[8] J. Galliers. A theoretical framework for computer models of cooperative dialogue, acknowledging multiagent conflict , 1988 .
[9] Jeffrey M. Bradshaw,et al. An introduction to software agents , 1997 .
[10] H. Penny Nii,et al. The Handbook of Artificial Intelligence , 1982 .
[11] Mike Williamson,et al. Matchmaking and Brokering , 1996 .
[12] Fritz Hohl,et al. Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts , 1998, Mobile Agents and Security.
[13] Chris J. Mitchell,et al. On Mobile Agent Based Transactions in Moderately Hostile Environments , 2001, Network Security.
[14] Fred B. Schneider,et al. Towards Fault-Tolerant and Secure Agentry , 1997, WDAG.
[15] Giovanni Vigna,et al. Protecting Mobile Agents through Tracing , 1997 .
[16] Christian F. Tschudin,et al. Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.
[17] Gio Wiederhold,et al. Mediators in the architecture of future information systems , 1992, Computer.
[18] Bruce Schneier,et al. Environmental Key Generation Towards Clueless Agents , 1998, Mobile Agents and Security.
[19] Fritz Hohl. A Model of Attacks of Malicious Hosts Against Mobile Agents , 1998, ECOOP Workshops.
[20] Nicholas R. Jennings,et al. A Roadmap of Agent Research and Development , 2004, Autonomous Agents and Multi-Agent Systems.
[21] Jeffrey S. Rosenschein,et al. Deals Among Rational Agents , 1985, IJCAI.
[22] Bennet S. Yee. A Sanctuary for Mobile Agents , 2001, Secure Internet Programming.
[23] William M. Farmer,et al. Security for Mobile Agents: Authentication and State Appraisal , 1996, ESORICS.
[24] X Itu,et al. Information technology-open systems interconnection-the directory: Public-key and attribute certific , 2000 .
[25] Qi He,et al. Personal security agent: KQML-based PKI , 1998, AGENTS '98.
[26] Christian F. Tschudin,et al. Towards mobile cryptography , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[27] Stefan Poslad,et al. Towards improved trust and security in FIPA agent platforms , 2004 .