MA/LMA Architecture for Dealing with Malicious Agents in Agent-Mediated Electronic Markets
暂无分享,去创建一个
Minglu Li | Peng Ding | Shi Jun | Sheng Huan Ye | Minglu Li | Peng Ding | Shi Jun | Sheng Huan Ye
[1] Timothy W. Finin,et al. KQML as an agent communication language , 1994, CIKM '94.
[2] George C. Necula,et al. Safe, Untrusted Agents Using Proof-Carrying Code , 1998, Mobile Agents and Security.
[3] Fred Cohen,et al. Computer viruses—theory and experiments , 1990 .
[4] David M. Chess,et al. Security Issues in Mobile Code Systems , 1998, Mobile Agents and Security.
[5] J. C. Byington,et al. Mobile agents and security , 1998, IEEE Commun. Mag..
[6] Christian F. Tschudin,et al. Towards mobile cryptography , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[7] Pattie Maes,et al. Agents that buy and sell , 1999, CACM.
[8] G. Shering,et al. The NODAL system for the SPS 1974 , 1974 .
[9] Christian F. Tschudin,et al. Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.
[10] Refik Molva,et al. Secure Data Collection with Updates , 2001, Electron. Commer. Res..
[11] Sergio Loureiro,et al. Function hiding based on error correcting codes , 1999 .
[12] Colin George Harrison,et al. Agent Sourcebook , 1997 .
[13] Vipin Swarup,et al. Authentication for Mobile Agents , 1998, Mobile Agents and Security.
[14] M. R. Genesereth,et al. Knowledge Interchange Format Version 3.0 Reference Manual , 1992, LICS 1992.
[15] Gene Tsudik,et al. Itinerant Agents for Mobile Computing , 1995, IEEE Communications Surveys & Tutorials.