Rescuing mobile agent data in case of blocking attacks
暂无分享,去创建一个
[1] Elsabé Cloete,et al. Classification of malicious host threats in mobile agent computing , 2002 .
[2] Joos Vandewalle,et al. (How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions , 2003, TOIT.
[3] Günter Karjoth,et al. Secure Mobile Agent-Based Merchant Brokering in Distributed Marketplaces , 2000, ASA/MA.
[4] Luís Moura Silva,et al. Fault-tolerant execution of mobile agents , 2000, Proceeding International Conference on Dependable Systems and Networks. DSN 2000.
[5] Radu Popescu-Zeletin,et al. An Approach for Providing Mobile Agent Fault Tolerance , 1998, Mobile Agents.
[6] André Schiper,et al. Fault-Tolerant Mobile Agent Execution , 2003, IEEE Trans. Computers.
[7] Anand R. Tripathi,et al. Design issues in mobile agent programming systems , 1998, IEEE Concurr..
[8] Markus Straßer,et al. A protocol for preserving the exactly-once property of mobile agents , 1997 .
[9] Winfried Lamersdorf,et al. Trends in Distributed Systems for Electronic Commerce , 1998, Lecture Notes in Computer Science.
[10] Jose L. Muñoz,et al. A protocol for detecting malicious hosts based on limiting the execution time of mobile agents , 2003, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003.
[11] Victor K.-W. Wei,et al. Defenses against the Truncation of Computation Results of Free-Roaming Agents , 2002, ICICS.
[12] Jianying Zhou,et al. Protecting free roaming agents against result-truncation attack , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.
[13] Markus Straßer,et al. Providing Reliable Agents for Electronic Commerce , 1998, Trends in Distributed Systems for Electronic Commerce.