An Improved Execution Integrity Solution for Mobile Agents
暂无分享,去创建一个
[1] Gerhard Weiss,et al. Multiagent systems: a modern approach to distributed artificial intelligence , 1999 .
[2] Ming Yao,et al. A security architecture for protecting dynamic components of mobile agents , 2004 .
[3] Luc Moreau,et al. Extending execution tracing for mobile code security , 2002 .
[4] Fritz Hohl,et al. Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts , 1998, Mobile Agents and Security.
[5] Uwe Georg Wilhelm,et al. A TECHNICAL APPROACH TO PRIVACY BASED ON MOBILE AGENTS PROTECTED BY TAMPER-RESISTANT HARDWARE , 1999 .
[6] Bernd Meyer,et al. Ensuring the Integrity of Agent-Based Computations by Short Proofs , 1998, Mobile Agents.
[7] Fritz Hohl,et al. A framework to protect mobile agents by using reference states , 2000, Proceedings 20th IEEE International Conference on Distributed Computing Systems.
[8] Robert S. Gray,et al. Agent Tcl: a Exible and Secure Mobile-agent System , 1996 .
[9] George Samaras. Mobile agents: What about them? Did they deliver what they promised? Are they here to stay? (panel) , 2004, IEEE International Conference on Mobile Data Management, 2004. Proceedings. 2004.
[10] Selwyn Russell,et al. Clever Use of Trusted Third Parties for Mobile Agent Security , 2004 .
[11] Wayne A. Jansen,et al. Countermeasures for mobile agent security , 2000, Comput. Commun..
[12] William M. Farmer,et al. Security for Mobile Agents: Issues and Requirements , 1996 .
[13] Selwyn Russell,et al. A Step Closer to a Secure Internet Mobile Agent Community , 2004 .
[14] Anand R. Tripathi,et al. Security in mobile agent systems , 1998 .
[15] Michelangelo Giansiracusa,et al. A secure infrastructural strategy for safe autonomous mobile agents , 2005 .
[16] Volker Roth,et al. Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept , 2004, ICICS.
[17] Ljiljana Brankovic,et al. An Overview of Security Issues and Techniques in Mobile Agents , 2004, Communications and Multimedia Security.
[18] Volker Roth. Obstacles to the adoption of mobile agents , 2004, IEEE International Conference on Mobile Data Management, 2004. Proceedings. 2004.
[19] Joos Vandewalle,et al. (How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions , 2003, TOIT.
[20] Fritz Hohl,et al. A protocol to detect malicious hosts attacks by using reference states , 1999 .