A Set of Patterns for Secure Agent Systems
暂无分享,去创建一个
[1] William Stallings,et al. Cryptography and network security , 1998 .
[2] Edward G. Amoroso,et al. Fundamentals of computer security technology , 1994 .
[3] Jamie Jaworski,et al. Java Security Handbook , 2000 .
[4] Haralambos Mouratidis,et al. Modelling an agent-based integrated health and social care information system for older people , 2002 .
[5] James O. Coplien,et al. Pattern languages of program design , 1995 .
[6] Haralambos Mouratidis,et al. Analysis and Design of the eSAP: An Integrated Health and Social Care Information System , 2003, Health Informatics J..
[7] Ehud Gudes,et al. A Method-Based Authorization Model for Object-Oriented Databases , 1993, Security for Object-Oriented Systems.
[8] Joseph W. Yoder,et al. Architectural Patterns for Enabling Application Security , 1998 .
[9] Haralambos Mouratidis,et al. Using Tropos Methodology to Model an Integrated Health Assessment System , 2002, AOIS@CAiSE.
[10] Sami Lehtonen,et al. Pattern Language for Cryptographic Key Management , 2002, EuroPLoP.
[11] Gil Tidhar,et al. Using Intelligent Agents in Military Simulation or "Using Agents Intelligently" , 1999, AAAI/IAAI.
[12] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[13] Haralambos Mouratidis,et al. Modelling secure multiagent systems , 2003, AAMAS '03.
[14] Danny B. Lange,et al. Programming and Deploying Java¿ Mobile Agents with Aglets¿ , 1998 .
[15] Nicholas R. Jennings,et al. Decision procedures for multiple auctions , 2002, AAMAS '02.
[16] Jennifer Seberry,et al. Fundamentals of Computer Security , 2003, Springer Berlin Heidelberg.
[17] Premkumar T. Devanbu,et al. Software engineering for security: a roadmap , 2000, ICSE '00.
[18] Eduardo B. Fernandez,et al. The Authenticator Pattern , 1999 .
[19] Peter Sommerlad,et al. Pattern-Oriented Software Architecture Volume 1: A System of Patterns , 1996 .
[20] John Mylopoulos,et al. A Goal-Based Organizational Perspective on Multi-agent Architectures , 2001, ATAL.
[21] A Min Tjoa,et al. Access Controls by Object-Oriented Concepts , 1997, DBSec.
[22] Eduardo B. Fernandez,et al. A pattern language for security models , 2001 .