A Coordination Model for Agents Based on Secure Spaces
暂无分享,去创建一个
Jan Vitek | Manuel Oriol | Ciarán Bryce | An Ciarr | Manuel Bryce | Jan Oriol | Vitek
[1] Martín Abadi,et al. Secrecy by Typing inSecurity Protocols , 1997, TACS.
[2] Jan Vitek,et al. Seal: A Framework for Secure Mobile Computations , 1998, ICCL Workshop: Internet Programming Languages.
[3] Bennet S. Yee. A Sanctuary for Mobile Agents , 2001, Secure Internet Programming.
[4] Jean-Jacques Lévy,et al. A Calculus of Mobile Agents , 1996, CONCUR.
[5] Oscar Nierstrasz,et al. Object-Based Models and Languages for Concurrent Systems , 1994, Lecture Notes in Computer Science.
[6] Robert Tolksdorf. Coordinating Java agents with multiple coordination languages on the Berlinda platform , 1997, Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[7] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[8] David Gelernter,et al. Multiple Tuple Spaces in Linda , 1989, PARLE.
[9] Andreas Polze. The Object Space Approach: Decoupled Communication in C++ , 1993, TOOLS.
[10] G. Erard Boudol. Asynchrony and the -calculus (note) , 1992 .
[11] Martín Abadi,et al. A calculus for cryptographic protocols: the spi calculus , 1997, CCS '97.
[12] Robert Tolksdorf. Laura - A Service-Based Coordination Language , 1998, Sci. Comput. Program..
[13] Nicholas Carriero,et al. Bauhaus Linda , 1994, ECOOP Workshop.
[14] Luca Cardelli,et al. Mobile Ambients , 1998, FoSSaCS.
[15] Robert Jellinghaus,et al. Eiffel Linda: an object-oriented Linda dialect , 1990, SIGP.
[16] Rocco De Nicola,et al. Coordinating Mobile Agents via Blackboards and Access Rights , 1997, COORDINATION.
[17] R. Davis,et al. The data encryption standard in perspective , 1978, IEEE Communications Society Magazine.
[18] Oscar Nierstrasz,et al. Object-Based Concurrent Computing , 1991, Lecture Notes in Computer Science.
[19] Satoshi Matsuoka,et al. Using tuple space communication in distributed object-oriented languages , 1988, OOPSLA 1988.
[20] David L. Tennenhouse,et al. Active networks (abstract) , 1996, OSDI '96.
[21] Jan Vitek,et al. Designing JAVASEAL or How to Make JAVA Safe for Agents , 1998 .
[22] Jan Vitek,et al. A Calculus of Secure Mobile Computations ( Preliminary Report ) , 1998 .
[23] James M. Purtilo,et al. Reconfiguration of hierarchical tuple-spaces: experiments with Linda-Polylith , 1993 .
[24] Paolo Ciancarini,et al. Jada - Coordination and Communication for Java Agents , 1996, Mobile Object Systems.
[25] Stefan Covaci,et al. Active Networks , 1999 .
[26] Luca Cardelli,et al. Abstractions for Mobile Computation , 1999, Secure Internet Programming.
[27] Davide Sangiorgi,et al. On Bisimulations for the Asynchronous pi-Calculus , 1996, Theor. Comput. Sci..
[28] Martín Abadi,et al. Secrecy by typing in security protocols , 1999, JACM.
[29] Mario Tokoro,et al. On Asynchronous Communication Semantics , 1991, Object-Based Concurrent Computing.
[30] Laurent Dami,et al. Type inference and subtyping for higher-order generative communication , 1996 .
[31] Jean-Henry Morin,et al. HyperNews: a MEDIA application for the commercialization of an electronic newspaper , 1998, SAC '98.
[32] Stephen M. Matyas,et al. The data encryption standard , 1997, Inf. Secur. Tech. Rep..