Security Issues in Mobile Agents
暂无分享,去创建一个
Mahesh Chandra Govil | M. C. Govil | Priyanka Dadhich | Dr.Kamlesh Dutta | Priyanka Dadhich | D. Dutta
[1] Sarit Kraus,et al. Multiagent Negotiation under Time Constraints , 1995, Artif. Intell..
[2] Jon Ølnes,et al. Mobile Agent Security - Issues and Directions , 1999, IS&N.
[3] Danny B. Lange,et al. Mobile Objects and Mobile Agents: The Future of Distributed Computing? , 1998, ECOOP.
[4] Fritz Hohl,et al. Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts , 1998, Mobile Agents and Security.
[5] Anand S. Rao,et al. A Model-Theoretic Approach to the Verification of Situated Reasoning Systems , 1993, IJCAI.
[6] Ljiljana Brankovic,et al. An Overview of Security Issues and Techniques in Mobile Agents , 2004, Communications and Multimedia Security.
[7] David M. Chess,et al. Security Issues in Mobile Code Systems , 1998, Mobile Agents and Security.
[8] William M. Farmer,et al. Security for Mobile Agents: Issues and Requirements , 1996 .
[9] Jan Vitek,et al. Security and Communication in Mobile Object Systems , 1996, Mobile Object Systems.
[10] Jan Camenisch,et al. Cryptographic security for mobile code , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[11] Michael P. Georgeff,et al. Communication and interaction in multi-agent planning , 1983, AAAI 1983.
[12] Manuela M. Veloso,et al. Multiagent Systems: A Survey from a Machine Learning Perspective , 2000, Auton. Robots.
[13] Sergi Robles Martínez. Mobile agent systems and trust, a combined view toward secure sea-of-data applications , 2002 .
[14] Uwe Georg Wilhelm,et al. A TECHNICAL APPROACH TO PRIVACY BASED ON MOBILE AGENTS PROTECTED BY TAMPER-RESISTANT HARDWARE , 1999 .
[15] Giovanni Vigna,et al. Understanding Code Mobility , 1998, IEEE Trans. Software Eng..
[16] Nicholas R. Jennings,et al. Intelligent agents: theory and practice , 1995, The Knowledge Engineering Review.
[17] Anand R. Tripathi,et al. Mobile agent programming in Ajanta , 1999, Proceedings. 19th IEEE International Conference on Distributed Computing Systems (Cat. No.99CB37003).
[18] Bennet S. Yee. A Sanctuary for Mobile Agents , 2001, Secure Internet Programming.
[19] Bruce Schneier,et al. Environmental Key Generation Towards Clueless Agents , 1998, Mobile Agents and Security.
[20] Danny B. Lange,et al. A Security Model for Aglets , 1997, IEEE Internet Comput..
[21] David Wong,et al. Concordia: An Infrastructure for Collaborating Mobile Agents , 1997, Mobile Agents.
[22] Giovanni Vigna,et al. Cryptographic Traces for Mobile Agents , 1998, Mobile Agents and Security.
[23] Lu Ma,et al. ATTACKS AND COUNTERMEASURES IN SOFTWARE SYSTEM SECURITY , 2005 .
[25] Alfred V. Aho,et al. Compilers: Principles, Techniques, and Tools , 1986, Addison-Wesley series in computer science / World student series edition.
[26] Todd A. Proebsting,et al. Krakatoa: Decompilation in Java (Does Bytecode Reveal Source?) , 1997, COOTS.
[27] Niklas Borselius. Mobile agent security , 2002 .
[28] Dan S. Wallach,et al. A new approach to mobile code security , 1999 .
[29] William M. Farmer,et al. Security for Mobile Agents: Authentication and State Appraisal , 1996, ESORICS.
[30] Anand R. Tripathi,et al. Security in mobile agent systems , 1998 .
[31] Daniel Kuokka,et al. Issues and Extensions for Information Matchmaking Protocols , 1996, Int. J. Cooperative Inf. Syst..
[32] Christian F. Tschudin,et al. Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.
[33] Peter Norvig,et al. Artificial Intelligence: A Modern Approach , 1995 .
[34] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[35] Cristina Cifuentes,et al. Decompilation of binary programs , 1995, Softw. Pract. Exp..
[36] Michael Rovatsos,et al. Handbook of Software Engineering and Knowledge Engineering , 2005 .
[37] Anand R. Tripathi,et al. Design issues in mobile agent programming systems , 1998, IEEE Concurr..
[38] Levent Ertaul,et al. Mobile Agent Security , 2006, Security and Management.
[39] Yoav Shoham,et al. Agent-Oriented Programming , 1992, Artif. Intell..
[40] M. Calisti,et al. FOUNDATION FOR INTELLIGENT PHYSICAL AGENTS , 2000 .
[41] Nicholas R. Jennings,et al. Pitfalls of agent-oriented development , 1998, AGENTS '98.
[42] William D. McInerney,et al. 3 – Attacks and Countermeasures , 1987 .
[43] Gene Tsudik,et al. Itinerant Agents for Mobile Computing , 1995, IEEE Communications Surveys & Tutorials.
[44] G. Glass. ObjectSpace Voyager core package technical overview , 1999 .
[45] John Zachary. Protecting Mobile Code in the Wild , 2003, IEEE Internet Comput..
[46] Thomas R. Gruber,et al. A Translation Approach to Portable Ontologies , 1993 .
[47] Bennet S. Yee,et al. Using Secure Coprocessors , 1994 .
[48] Dejan S. Milojicic,et al. Trend Wars - Mobile agent applications , 1999, IEEE Concurrency.
[49] Joos Vandewalle,et al. (How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions , 2003, TOIT.
[50] Wayne Jansen,et al. NIST Special Publication 800-19 – Mobile Agent Security , 2000 .
[51] M.B. Ahmed,et al. Mobile agents security , 2005, 2005 2nd Asia Pacific Conference on Mobile Technology, Applications and Systems.
[52] Johann Wolfgang,et al. AN INFRASTRUCTURE FOR MOBILE AGENTS : REQUIREMENTS AND ARCHITECTURE , 1995 .
[53] Vijay Varadharajan. Security enhanced mobile agents , 2000, CCS.
[54] James E. White,et al. Mobile Agents , 1997, Lecture Notes in Computer Science.
[55] George Cybenko,et al. D'Agents: Security in a Multiple-Language, Mobile-Agent System , 1998, Mobile Agents and Security.
[56] Danny B. Lange,et al. Seven good reasons for mobile agents , 1999, CACM.
[57] Vipin Swarup,et al. Authentication for Mobile Agents , 1998, Mobile Agents and Security.
[58] Aaron Kershenbaum,et al. Mobile Agents: Are They a Good Idea? , 1996, Mobile Object Systems.
[59] Jan Vitek,et al. Mobile Object Systems Towards the Programmable Internet , 1996, Lecture Notes in Computer Science.
[60] Yoav Shoham. Agent-Oriented Programming , 1993, Artif. Intell..
[61] Huanguo Zhang,et al. The Mobile Agent Security Enhanced by Trusted Computing Technology , 2006, 2006 International Conference on Wireless Communications, Networking and Mobile Computing.
[62] Robert S. Gray,et al. Agent Tcl: a Exible and Secure Mobile-agent System , 1996 .
[63] Anand R. Tripathi,et al. Security in the Ajanta mobile agent system , 2001, Softw. Pract. Exp..
[64] Katia P. Sycara,et al. Resolving Goal Conflicts via Negotiation , 1988, AAAI.
[65] Marcin Paprzycki,et al. Mobile Agent Security - an Overview , 2004 .
[66] Michael Wooldridge,et al. Agent-based software engineering , 1997, IEE Proc. Softw. Eng..
[67] Ahmed Sameh Mohamed,et al. Security in mobile agent systems , 2002, Proceedings 2002 Symposium on Applications and the Internet (SAINT 2002).
[68] Christian S. Collberg,et al. A Taxonomy of Obfuscating Transformations , 1997 .