Secure Dynamic Reconfiguration of Scalable CORBA Systems with Mobile Agents
暂无分享,去创建一个
[1] Antonio Puliafito,et al. An analytical comparison of the client-server, remote evaluation and mobile agents paradigms , 1999, Proceedings. First and Third International Symposium on Agent Systems Applications, and Mobile Agents.
[2] Mario Baldi,et al. Evaluating the tradeoffs of mobile code design paradigms in network management applications , 1998, Proceedings of the 20th International Conference on Software Engineering.
[3] Andreas Reuter,et al. Transaction Processing: Concepts and Techniques , 1992 .
[4] Jan Vitek,et al. The JavaSeal Mobile Agent Kernel , 1999, Proceedings. First and Third International Symposium on Agent Systems Applications, and Mobile Agents.
[5] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[6] Radu Popescu-Zeletin,et al. An Approach for Providing Mobile Agent Fault Tolerance , 1998, Mobile Agents.
[7] Prashant Jain,et al. Dynamically Configuring Communication Services with the Service Configurator Pattern , 1998 .
[8] J. C. Byington,et al. Mobile agents and security , 1998, IEEE Commun. Mag..
[9] Fabio Kon,et al. Monitoring, Security, and Dynamic Configuration with the dynamicTAO Reflective ORB , 2000, Middleware.
[10] Daniel Hagimont,et al. A performance evaluation of the mobile agent paradigm , 1999, OOPSLA '99.
[11] Doug Montgomery,et al. Mobile Streams: a middleware for reconfigurable distributed scripting , 1999, Proceedings. First and Third International Symposium on Agent Systems Applications, and Mobile Agents.
[12] George C. Necula,et al. Safe, Untrusted Agents Using Proof-Carrying Code , 1998, Mobile Agents and Security.
[13] Lily B. Mummert,et al. Camelot and Avalon: A Distributed Transaction Facility , 1991 .