Security Issues in Mobile Code Systems
暂无分享,去创建一个
[1] Ehud Shapiro,et al. Active mail—a framework for implementing groupware , 1992, CSCW '92.
[2] Aaron Kershenbaum,et al. Mobile Agents: Are They a Good Idea? , 1996, Mobile Object Systems.
[3] Benedict G. E. Wiedemann. Protection? , 1998, Science.
[4] B. Lampson,et al. Authentication in distributed systems: theory and practice , 1991, TOCS.
[5] Esther H. Highland. Computer systems under siege , 1988 .
[6] A. Retrospective,et al. The UNIX Time-sharing System , 1977 .
[7] Eugene H. Spafford,et al. The internet worm program: an analysis , 1989, CCRV.
[8] Aaron Kershenbaum,et al. Mobile agents: Are they a good idea? — update , 1996 .
[9] Andrew P. Black,et al. Fine-grained mobility in the Emerald system , 1987, TOCS.
[10] Radia J. Perlman,et al. Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.
[11] Kazuya Kosaka,et al. Aglets: Programming Mobile Agents in Java , 1997, WWCA.
[12] Danny B. Lange,et al. Programming Mobile Agents in Java with the Java Aglet API , 1997 .
[13] Udi Manber. Chain reactions in networks , 1990, Computer.
[14] C. Stoll. The Cuckoo's Egg : Tracking a Spy Through the Maze of Computer Espionage , 1990 .
[15] Carl E. Landwehr,et al. Formal Models for Computer Security , 1981, CSUR.
[16] Fritz Hohl. An Approach to Solve the Problem of Malicious Hosts , 1998 .
[17] Andrew P. Black,et al. The Eden System: A Technical Review , 1985, IEEE Transactions on Software Engineering.
[18] Luca Cardelli,et al. Obliq, a language with distributed scope , 1996 .
[19] Ken Arnold,et al. The Java Programming Language , 1996 .
[20] Christian F. Tschudin,et al. Towards mobile cryptography , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[21] Joann J. Ordille,et al. When agents roam, who can you trust? , 1996, Proceedings of COM'96. First Annual Conference on Emerging Technologies and Applications in Communications.
[22] Dan S. Wallach,et al. Extensible security architectures for Java , 1997, SOSP.
[23] Simson L. Garfinkel,et al. Practical UNIX and Internet Security , 1996 .
[24] B. Clifford Neuman,et al. Endorsements, licensing, and insurance for distributed system services , 1994, CCS '94.
[25] Nathaniel S. Borenstein,et al. EMail With A Mind of Its Own: The Safe-Tcl Language for Enabled Mail , 1994, ULPAA.
[26] Robert S. Gray,et al. Agent Tcl: a Exible and Secure Mobile-agent System , 1996 .
[27] Fred Douglis,et al. Process Migration in the Sprite Operating System , 1987, ICDCS.