Security Considerations in Agen t-Based Systems
暂无分享,去创建一个
[1] Tad Hogg,et al. Collective behavior of predictive agents , 1990 .
[2] Udi Manber. Chain reactions in networks , 1990, Computer.
[3] B. Clifford Neuman,et al. Endorsements, licensing, and insurance for distributed system services , 1994, CCS '94.
[4] B. Clifford Neuman,et al. Endorsements, licensing, and insurance for distributed system services , 1994, CCS '94.
[5] Joann J. Ordille,et al. When agents roam, who can you trust? , 1996, Proceedings of COM'96. First Annual Conference on Emerging Technologies and Applications in Communications.
[6] Nathaniel S. Borenstein,et al. EMail With A Mind of Its Own: The Safe-Tcl Language for Enabled Mail , 1994, ULPAA.
[7] Radia J. Perlman,et al. Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.