Evaluating Mobile Agent Platform Security
暂无分享,去创建一个
Wilmuth Müller | Martin Wieser | Axel Bürkle | Alice Hertel | A. Bürkle | W. Müller | A. Hertel | Martin Wieser
[1] Wayne A. Jansen,et al. Mobile Agent Security , 1999 .
[2] Volker Roth. Programming Satan's Agents , 2001, Electron. Notes Theor. Comput. Sci..
[3] Peter Braun,et al. Mobile Agents: Basic Concepts, Mobility Models, and the Tracy Toolkit , 2004 .
[4] James E. White,et al. Mobile Agents , 1997, Lecture Notes in Computer Science.
[5] George Cybenko,et al. D'Agents: Security in a Multiple-Language, Mobile-Agent System , 1998, Mobile Agents and Security.
[6] Fritz Hohl,et al. Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts , 1998, Mobile Agents and Security.
[7] Gustavo A. Santana Torrellas. A network security architectural approach for systems integrity using multi agent systems engineering , 2004, 7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings..
[8] Niklas Borselius. Mobile agent security , 2002 .
[9] Chenyang Lu,et al. Mobile agent middleware for sensor networks: an application case study , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[10] Gul A. Agha,et al. Crawlets: Agents for High Performance Web Search Engines , 2001, Mobile Agents.
[11] Peter Braun,et al. Chapter 5 – Mobile Agent Security , 2005 .
[12] Athanasios T. Karygiannis,et al. SP 800-19. Mobile Agent Security , 1999 .
[13] Wayne Jansen,et al. NIST Special Publication 800-19 – Mobile Agent Security , 2000 .
[14] Xin Guo,et al. Rule-Driven Mobile Intelligent Agents for Real-Time Configuration of IP Networks , 2003, KES.
[15] Christian Tschudin,et al. Mobile Agent Security , 1999 .
[16] Wayne A. Jansen,et al. A Priviledge Management Scheme for Mobile Agent Systems , 2002, SEMAS.