Secure Migration of Mobile Agents based on Distributed Trust
暂无分享,去创建一个
[1] Christian F. Tschudin,et al. Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.
[2] Elsabé Cloete,et al. Classification of malicious host threats in mobile agent computing , 2002 .
[3] Frances M. T. Brazier,et al. Scalable Middleware Environment for Agent-Based Internet Applications , 2004, PARA.
[4] David Kotz,et al. Mobile agents and the future of the internet , 1999, OPSR.
[5] A.S. Tanenbaum,et al. Security in a mobile agent system , 2004, IEEE First Symposium onMulti-Agent Security and Survivability, 2004.
[6] Volker Roth,et al. Mutual Protection of Co-operating Agents , 2001, Secure Internet Programming.
[7] N. Asokan,et al. Protecting the computation results of free-roaming agents , 2005, Personal Technologies.
[8] Jan Vitek,et al. Secure Internet Programming: Security Issues for Mobile and Distributed Objects , 1999 .
[9] Michael Luck,et al. Agent technology: Enabling next generation computing , 2003 .
[10] B. Soh,et al. Authenticating mobile agent platforms using signature chaining without trusted third parties , 2005, 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service.
[11] Frances M. T. Brazier,et al. Issues in a Mobile Agent-based Multimedia Retrieval Scenario , 2005, BNAIC.
[12] Radia J. Perlman,et al. Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.
[13] Joann J. Ordille,et al. When agents roam, who can you trust? , 1996, Proceedings of COM'96. First Annual Conference on Emerging Technologies and Applications in Communications.
[14] Paula Kotzé,et al. Proceedings of the 2002 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology , 2002 .
[15] Michael Luck,et al. Agent technology: Enabling next generation computing , 2003 .