Security of Distributed Digital Criminal Dossiers
暂无分享,去创建一个
[1] Radia J. Perlman,et al. Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.
[2] Ross J. Anderson,et al. Clinical system security: interim guidelines , 1996, BMJ.
[3] Stephen Farrell,et al. Internet X.509 Public Key Infrastructure Certificate Management Protocols , 1999, RFC.
[4] A.S. Tanenbaum,et al. Security in a mobile agent system , 2004, IEEE First Symposium onMulti-Agent Security and Survivability, 2004.
[5] Agostino Poggi,et al. Jade - a fipa-compliant agent framework , 1999 .
[6] Andrew C. Myers,et al. Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..
[7] Frances M. T. Brazier,et al. Towards automatic identification of completeness and consistency in digital dossiers , 2007, ICAIL.
[8] Michael Luck,et al. Agent technology: Enabling next generation computing , 2003 .
[9] M. R. Bruning. Over sommige kinderen moet je praten. Gegevensuitwisseling in de jeugdzorg , 2006 .
[10] Nicholas R. Jennings,et al. Intelligent agents: theory and practice , 1995, The Knowledge Engineering Review.
[11] Volker Roth,et al. Concepts and architecture of a security-centric mobile agent server , 2001, Proceedings 5th International Symposium on Autonomous Decentralized Systems.
[12] Frances Brazier,et al. Distributed Digital Data : Keeping files consistent , timely and small , 2007 .
[13] Frances M. T. Brazier,et al. Scalable Middleware Environment for Agent-Based Internet Applications , 2004, PARA.
[14] Ross J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .
[15] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[16] R. P. de Roode. M.R. Bruning, Over sommige kinderen moet je praten. Gegevensuitwisseling in de jeugdzorg (oratie Leiden), Leiden 2006 , 2007 .