The JavaSeal Mobile Agent Kernel
暂无分享,去创建一个
[1] John K. Ousterhout,et al. The Safe-Tcl Security Model , 1998, USENIX Annual Technical Conference.
[2] Luo Hong. JAVA Security Architecture , 2000 .
[3] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[4] Levente Buttyán,et al. On the Problem of Trust in Mobile Agent Systems , 1998, NDSS.
[5] Gul Agha,et al. A actor-based architecture for customizing and controlling agent ensembles , 1999, IEEE Intell. Syst..
[6] Dan S. Wallach,et al. Extensible security architectures for Java , 1997, SOSP.
[7] Li Gong. Java Security Architecture (JDK1.2) , 1997 .
[8] Mike Hibler,et al. The persistent relevance of the local operating system to global applications , 1996, EW 7.
[9] Andrew C. Myers,et al. JFlow: practical mostly-static information flow control , 1999, POPL '99.
[10] Jan Vitek,et al. Secure composition of insecure components , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.
[11] David A. Wagner,et al. A Secure Environment for Untrusted Helper Applications , 1996, USENIX Security Symposium.
[12] Godmar Back Patrick Tullmann Leigh Stoller Wilson C. Hsie Lepreau. Java Operating Systems : Design and Implementation , 1998 .
[13] Robert S. Gray,et al. Agent Tcl: a Exible and Secure Mobile-agent System , 1996 .
[14] Deyu Hu,et al. Implementing Multiple Protection Domains in Java , 1998, USENIX Annual Technical Conference.
[15] Carl A. Gunter,et al. PLAN: a packet language for active networks , 1998, ICFP '98.
[16] Brian N. Bershad,et al. Extensibility safety and performance in the SPIN operating system , 1995, SOSP.
[17] Gul A. Agha,et al. ACTORS - a model of concurrent computation in distributed systems , 1985, MIT Press series in artificial intelligence.
[18] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[19] Dieter Gollmann,et al. Computer Security , 1979, Lecture Notes in Computer Science.
[20] Jean-Henry Morin,et al. HyperNews: a MEDIA application for the commercialization of an electronic newspaper , 1998, SAC '98.
[21] L. Girardello,et al. A note on regular type 0 solutions and confining gauge theories , 2001 .
[22] Anand R. Tripathi,et al. Agent Server Architecture for the Ajanta Mobile-Agent System , 1998 .
[23] Graham Glass,et al. ObjectSpace Voyager - The Agent ORB for Java , 1998, WWCA.
[24] Eric Jul. Object mobility in a distributed object-oriented system , 1990 .
[25] Jan Vitek,et al. A Coordination Model for Agents Based on Secure Spaces , 1999 .
[26] Giovanni Vigna,et al. Mobile Agents and Security , 1998, Lecture Notes in Computer Science.
[27] Mike Hibler,et al. Microkernels meet recursive virtual machines , 1996, OSDI '96.
[28] Aaron Kershenbaum,et al. Mobile Agents: Are They a Good Idea? , 1996, Mobile Object Systems.
[29] Thomas Anderson,et al. Interposition as an Operating System Extension Mechanism , 1997 .
[30] Jan Vitek,et al. Mobile Object Systems Towards the Programmable Internet , 1996, Lecture Notes in Computer Science.
[31] Luca Cardelli,et al. Abstractions for Mobile Computation , 1999, Secure Internet Programming.
[32] Geoffrey Smith,et al. A Sound Type System for Secure Flow Analysis , 1996, J. Comput. Secur..
[33] Nicholas Carriero,et al. Applications experience with Linda , 1988, PPoPP 1988.
[34] Jean-Henry Morin,et al. Commercialization of Electronic Information , 2000, J. Organ. End User Comput..
[35] Christian F. Tschudin,et al. The Messenger Environment MØ - A Condensed Description , 1996, Mobile Object Systems.
[36] Joel H. Saltz,et al. Sumatra: A Language for Resource-Aware Mobile Programs , 1996, Mobile Object Systems.
[37] Danny B. Lange,et al. A Security Model for Aglets , 1997, IEEE Internet Comput..
[38] Giovanni Vigna,et al. Cryptographic Traces for Mobile Agents , 1998, Mobile Agents and Security.
[39] Silvano Gai,et al. Exploiting Code Mobility in Decentralized and Flexible Network Management , 1997, Mobile Agents.
[40] Jan Vitek,et al. Confined types , 1999, OOPSLA '99.
[41] Kurt Rothermel,et al. Disseminating mobile agents for distributed information filtering , 1999, Proceedings. First and Third International Symposium on Agent Systems Applications, and Mobile Agents.
[42] Deyu Hu,et al. J-Kernel: A Capability-Based Operating System for Java , 2001, Secure Internet Programming.
[43] Christian F. Tschudin,et al. Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.
[44] Martín Abadi,et al. A calculus for access control in distributed systems , 1991, TOPL.
[45] Xavier Leroy,et al. Security properties of typed applets , 1998, POPL '98.
[46] David M. Chess,et al. Security Issues in Mobile Code Systems , 1998, Mobile Agents and Security.
[47] Jan Vitek,et al. Security and Communication in Mobile Object Systems , 1996, Mobile Object Systems.
[48] B LangeDanny,et al. Mobile agents with Java , 1998 .
[49] Danny B. Lange,et al. Programming and Deploying Mobile Agents with Java Aglets , 1998 .
[50] Thorsten von Eicken,et al. JRes: a resource accounting interface for Java , 1998, OOPSLA '98.
[51] Thomas E. Anderson,et al. SLIC: An Extensibility System for Commodity Operating Systems , 1998, USENIX ATC.
[52] Jochen Liedtke,et al. Improving IPC by kernel design , 1994, SOSP '93.
[53] Todd Fine,et al. Assuring Distributed Trusted Mach , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[54] Luca Cardelli,et al. Mobile Ambients , 1998, FoSSaCS.