Security Patterns for Agent Systems
暂无分享,去创建一个
[1] John Mylopoulos,et al. A Requirements-Driven Development Methodology , 2001, CAiSE.
[2] Sami Lehtonen,et al. Pattern Language for Cryptographic Key Management , 2002, EuroPLoP.
[3] James O. Coplien,et al. Pattern languages of program design , 1995 .
[4] Gil Tidhar,et al. Using Intelligent Agents in Military Simulation or "Using Agents Intelligently" , 1999, AAAI/IAAI.
[5] Jamie Jaworski,et al. Java Security Handbook , 2000 .
[6] Haralambos Mouratidis,et al. Analysis and Design of the eSAP: An Integrated Health and Social Care Information System , 2003, Health Informatics J..
[7] Haralambos Mouratidis,et al. Modelling an agent-based integrated health and social care information system for older people , 2002 .
[8] Michael Weiss,et al. Reusable Patterns for Agent Coordination , 2001, Coordination of Internet Agents: Models, Technologies, and Applications.
[9] John Mylopoulos,et al. A Goal-Based Organizational Perspective on Multi-agent Architectures , 2001, ATAL.
[10] Ehud Gudes,et al. A Method-Based Authorization Model for Object-Oriented Databases , 1993, Security for Object-Oriented Systems.
[11] A Min Tjoa,et al. Access Controls by Object-Oriented Concepts , 1997, DBSec.
[12] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[13] Joseph W. Yoder,et al. Architectural Patterns for Enabling Application Security , 1998 .
[14] Eduardo B. Fernandez,et al. A pattern language for security models , 2001 .
[15] Premkumar T. Devanbu,et al. Software engineering for security: a roadmap , 2000, ICSE '00.
[16] Eduardo B. Fernandez,et al. The Authenticator Pattern , 1999 .
[17] Peter Sommerlad,et al. Pattern-Oriented Software Architecture Volume 1: A System of Patterns , 1996 .
[18] William Stallings,et al. Cryptography and network security , 1998 .
[19] Edward G. Amoroso,et al. Fundamentals of computer security technology , 1994 .
[20] Danny B. Lange,et al. Programming and Deploying Java¿ Mobile Agents with Aglets¿ , 1998 .
[21] Haralambos Mouratidis,et al. Modelling secure multiagent systems , 2003, AAMAS '03.
[22] Nicholas R. Jennings,et al. Decision procedures for multiple auctions , 2002, AAMAS '02.
[23] Jennifer Seberry,et al. Fundamentals of Computer Security , 2003, Springer Berlin Heidelberg.
[24] Haralambos Mouratidis,et al. Using Tropos Methodology to Model an Integrated Health Assessment System , 2002, AOIS@CAiSE.