-
1
-
-
0032066141
-
A secure active network environment architecture
-
ALEXANDER (D.S.), ARBAUGH (W.A.), KEROMYTIS (A.D.), SMITH (J.-M.), A secure active network environment architecture. IEEE Network Magazine, special issue on Active and Controllable Netmorks, 12(3), pp. 37-45, 1997.
-
(1997)
IEEE Network Magazine, Special Issue on Active and Controllable Netmorks
, vol.12
, Issue.3
, pp. 37-45
-
-
Alexander, D.S.1
Arbaugh, W.A.2
Keromytis, A.D.3
Smith, J.-M.4
-
2
-
-
84982952766
-
-
Vitek & Jensen, 1999
-
ALEXANDER (D.S.), ARBAUGH (W.A.), KEROMYTIS (A.D.), SMITH (J.M.), Security in active network, pp. 433-451 of: (Vitek & Jensen, 1999), 1999.
-
(1999)
Security in Active Network
, pp. 433-451
-
-
Alexander, D.S.1
Arbaugh, W.A.2
Keromytis, A.D.3
Smith, J.M.4
-
3
-
-
0038650507
-
Formal syntax and semantics of Java
-
Springer
-
ALVES-FOSS J., (ed), Formal Syntax and Semantics of Java, Lecture Notes in Computer Science, no 1523. Springer, 1999.
-
(1999)
Lecture Notes in Computer Science
, Issue.1523
-
-
Alves-Foss, J.1
-
4
-
-
0000668582
-
Mobile software agents for control in telecommunications networks
-
APPLEBY (S.), STEWARD (S.), Mobile software agents for control in telecommunications networks, BT Technology Journal, 12(2), pp. 104-113, 1994.
-
(1994)
BT Technology Journal
, vol.12
, Issue.2
, pp. 104-113
-
-
Appleby, S.1
Steward, S.2
-
5
-
-
84955621400
-
Tamper resistant software: An implementation
-
Anderson, R.J. (ed), Information Hiding 1996, Springer
-
AUCSMITH (D.), Tamper resistant software: an implementation. pp.317-333 of: Anderson, R.J. (ed), Information Hiding 1996, Lecture Notes in Computer Science, no 1174, Springer, 1996.
-
(1996)
Lecture Notes in Computer Science
, Issue.1174
, pp. 317-333
-
-
Aucsmith, D.1
-
6
-
-
0033322125
-
Javacard - From hype to reality
-
BAENTSCH (M.), BUHLER (P.), EIRICH (T.), HORING (F.), OESTREICHER (M.), JavaCard - from hype to reality. IEEE Concurrency, 7(4), pp.36-43, 1999.
-
(1999)
IEEE Concurrency
, vol.7
, Issue.4
, pp. 36-43
-
-
Baentsch, M.1
Buhler, P.2
Eirich, T.3
Horing, F.4
Oestreicher, M.5
-
7
-
-
0001636051
-
-
Vigna, 1998
-
BERKOVITS (S.), GUTTMAN (J.D.), SWARUP (V.), Authentication for mobile agents, pp. 114-136 of: (Vigna, 1998), 1998.
-
(1998)
Authentication for Mobile Agents
, pp. 114-136
-
-
Berkovits, S.1
Guttman, J.D.2
Swarup, V.3
-
8
-
-
0002864744
-
Mobile agents for network management
-
BIESZCZAD (A.), PAGUREK (B.), WHITE (T.), Mobile agents for network management, IEEE Communications Surveys, 1(1), pp. 2-9, 1998. http://www.comsoc.org/pubs/surveys.
-
(1998)
IEEE Communications Surveys
, vol.1
, Issue.1
, pp. 2-9
-
-
Bieszczad, A.1
Pagurek, B.2
White, T.3
-
9
-
-
84871176798
-
-
BRITISH STANDARDS INSTITUTION. Common criteria V1.0 Web Page, http://wuw.itsec.gov.uk/itsechtml/ccvl.o/ccvl.htm.
-
Common Criteria V1.0 Web Page
-
-
-
10
-
-
84949512878
-
Routing in telecommunications networks with ant-like agents
-
ALBAYRAK (S.), GARIJO (F.J.), (eds), Intelligent Agents for Telecommunications Applications '98 (IATA '98), Springer-Verlag, Berlin Germany
-
BONABEAU (E.), HENAUX (F.), GUÉRIN (S.), SNYERS (D.), KUNTZ (P.), & THERAULAZ (G.), Routing in telecommunications networks with ant-like agents, pp. 60-71 of: ALBAYRAK (S.), GARIJO (F.J.), (eds), Intelligent Agents for Telecommunications Applications '98 (IATA '98), Lecture Notes in Computer Science, no 1437, Springer-Verlag, Berlin Germany, 1998.
-
(1998)
Lecture Notes in Computer Science
, Issue.1437
, pp. 60-71
-
-
Bonabeau, E.1
Henaux, F.2
Guérin, S.3
Snyers, D.4
Kuntz, P.5
Theraulaz, G.6
-
12
-
-
0029392001
-
Itinerant agents for mobile commputing
-
CHESS (D.), GROSOF (B.), HARRISON (C.), LEVINE (D.), PARRIS (C.), TSUDTK (G.), Itinerant agents for mobile commputing. IEEE Personal Communication systems, 2(5), pp. 34-49, 1995.
-
(1995)
IEEE Personal Communication Systems
, vol.2
, Issue.5
, pp. 34-49
-
-
Chess, D.1
Grosof, B.2
Harrison, C.3
Levine, D.4
Parris, C.5
Tsudtk, G.6
-
20
-
-
84904265014
-
Protecting mobile web-commerce agents with smartcards
-
IEEE Computer Society
-
FUNFROCKEN (S.), Protecting mobile Web-commerce agents with smartcards, pp. 90-102 of: ASA/MA 99, IEEE Computer Society, 1999.
-
(1999)
ASA/MA 99
, pp. 90-102
-
-
Funfrocken, S.1
-
21
-
-
0032123682
-
Mobile agents and security
-
GREENBERG (M.S), BYINGTON (J.C.), HOLDTING (T.), Mobile Agents and Security, IEEE Communications Magazine, 36(7), pp. 76-85, 1998.
-
(1998)
IEEE Communications Magazine
, vol.36
, Issue.7
, pp. 76-85
-
-
Greenberg, M.S.1
Byington, J.C.2
Holdting, T.3
-
22
-
-
0030201484
-
Java and the shift to net-centric computing
-
Aug.
-
HAMILTON (M.A.), Java and the Shift to Net-Centric Computing. IEEE Computer, Aug., pp. 31-39, 1996.
-
(1996)
IEEE Computer
, pp. 31-39
-
-
Hamilton, M.A.1
-
24
-
-
84957626176
-
Proactive secret sharing, or: How to cope with perpetual leakage
-
COOPERSMITH (D.) (ed), Advances in Cryptology - Crypto'95, Springer
-
HERZBERG (A.), JARECKI (S.), KRAWCZUK (H.), YUNG (M.), Proactive secret sharing, or: How to cope with perpetual leakage, pp. 339-332 of: COOPERSMITH (D.) (ed), Advances in Cryptology - Crypto'95, Lecture Notes in Computer Science, no 963, Springer, 1995.
-
(1995)
Lecture Notes in Computer Science
, Issue.963
, pp. 339-1332
-
-
Herzberg, A.1
Jarecki, S.2
Krawczuk, H.3
Yung, M.4
-
26
-
-
0003954474
-
-
Tech. rept. National Institute of Standards and Technology
-
JANSEN (W.), KARYGIANNIS (T.), Mobile, agent security, Tech. rept. National Institute of Standards and Technology, 1999.
-
(1999)
Mobile, Agent Security
-
-
Jansen, W.1
Karygiannis, T.2
-
30
-
-
0342432753
-
Tutorial: Mobile software agents for dynamic routing
-
KRAMER (K.H.), MINAR (N.), MAES (P.), Tutorial: Mobile software agents for dynamic routing. Mobile Computing and Communications Review, 3(2), pp. 12-16, 1999.
-
(1999)
Mobile Computing and Communications Review
, vol.3
, Issue.2
, pp. 12-16
-
-
Kramer, K.H.1
Minar, N.2
Maes, P.3
-
33
-
-
0029734744
-
Intelligent agents: An emerging technology for next generation telecommunications?
-
MAGEDANTZ (T.), ROTHERMEL (K.), KRAUSE (S.), Intelligent agents: an emerging technology for next generation telecommunications? pp. 464-472 of: IEEE INFOCOM 1996, 1996.
-
(1996)
IEEE INFOCOM 1996
, pp. 464-472
-
-
Magedantz, T.1
Rothermel, K.2
Krause, S.3
-
34
-
-
0003680553
-
-
Wiley
-
MCGRAW (G.), FELTEN (E.W.), Java security: hostile applets, holes, and antidotes, Wiley, 1997.
-
(1997)
Java Security: Hostile Applets, Holes, and Antidotes
-
-
Mcgraw, G.1
Felten, E.W.2
-
36
-
-
0041655107
-
-
Springer, Chap. 12
-
MINAR (N.), KRAMER (K.H.), MAES (P.), Cooperating mobile agent for dynamic network routing, Springer, Chap. 12, 1999.
-
(1999)
Cooperating Mobile Agent for Dynamic Network Routing
-
-
Minar, N.1
Kramer, K.H.2
Maes, P.3
-
37
-
-
85015667755
-
Cryptographic support for fault tolerant distributed computing
-
MINSKY (Y.), VAN RENESSE (R.), SCHNEIDER (F.B.), STOLLER (S.D.), Cryptographic support for fault tolerant distributed computing, In, pp. 109-114 of: Seventh ACM SIGOPS European Workshop, 1996.
-
(1996)
Seventh ACM SIGOPS European Workshop
, pp. 109-114
-
-
Minsky, Y.1
Van Renesse, R.2
Schneider, F.B.3
Stoller, S.D.4
-
38
-
-
0005433665
-
Mobile code security techniques
-
May, University of Pennsylvania, Department of Computer and Information Science
-
MOORE (J.T.) (May), Mobile code security techniques. Tech. rept. MS-CIS-98-28, University of Pennsylvania, Department of Computer and Information Science, 1998 .
-
(1998)
Tech. Rept. MS-CIS-98-28
-
-
Moore, J.T.1
-
41
-
-
84871119229
-
-
February
-
NEUMANN (P.G.), (February), RISKS DIGEST, Vol. 18, No 61, http://catless.ncl.ac.uk/Risks/, 1997a.
-
(1997)
Risks Digest
, vol.18
, Issue.61
-
-
Neumann, P.G.1
-
42
-
-
84871103829
-
-
February
-
NEUMANN (P.G.), (February), RISKS DIGEST, Vol. 18, No 82, http://catless ncl.ac.uk/Risks/, 1997b.
-
(1997)
Risks Digest
, vol.18
, Issue.82
-
-
Neumann, P.G.1
-
43
-
-
0030233817
-
Software agents: An, overview
-
NWANA (H.S.), Software agents: an, overview, Knowledge Engineering Review, 11(3), pp. 205-244, 1996.
-
(1996)
Knowledge Engineering Review
, vol.11
, Issue.3
, pp. 205-244
-
-
Nwana, H.S.1
-
45
-
-
0003613073
-
-
Vigna, 1998
-
OUSTERHOUT (J.K.), Levy (J.Y.), & Welch (B.B.), The safe Tcl security model, pp. 217-234 of: (Vigna, 1998), 1998.
-
(1998)
The Safe Tcl Security Model
, pp. 217-234
-
-
Ousterhout, J.K.1
Levy, J.Y.2
Welch, B.B.3
-
47
-
-
84958764832
-
Byte code verification for Java smart cards based on model checking
-
5th European Symposium on Research in Computer Security (ESORICS), Springer
-
POSEGGA (J.), & VOGT (H.), Byte code verification for Java smart cards based on model checking, pp. 175-190 of: 5th European Symposium on Research in Computer Security (ESORICS), Lecture Notes in Computer Science, no 1485, Springer, 1998.
-
(1998)
Lecture Notes in Computer Science
, Issue.1485
, pp. 175-190
-
-
Posegga, J.1
Vogt, H.2
-
52
-
-
0005301490
-
On data banks and privacy homomorphisms
-
DE MILLO (R.A.), DOBKIN (D.P.), JONES (A.K.), & LIPTON (R.J.), (eds), Academic Press
-
RIVEST (R.L.), ADLEMAN (L.), DERTOUZOS (M.L), On data banks and privacy homomorphisms, pp. 169-177 of: DE MILLO (R.A.), DOBKIN (D.P.), JONES (A.K.), & LIPTON (R.J.), (eds), Foundations of Secure Computing. Academic Press, 1978.
-
(1978)
Foundations of Secure Computing
, pp. 169-177
-
-
Rivest, R.L.1
Adleman, L.2
Dertouzos, M.L.3
-
53
-
-
0003371380
-
First international workshop on Mobile Agents (MA '97)
-
Springer
-
ROTHERMEL (K.), POPESCU-ZELETIN (R.), (eds), First International Workshop on Mobile Agents (MA '97), Lecture Notes in Computer Science, no 1219, Springer, 1997.
-
(1997)
Lecture Notes in Computer Science
, Issue.1219
-
-
Rothermel, K.1
Popescu-Zeletin, R.2
-
57
-
-
0031177289
-
Remote auditing of software outputs using a trusted coprocessor
-
SCHNEIER (B.), KELSEY (J.), Remote Auditing of Software Outputs Using a Trusted Coprocessor, Journal of Future Generation Computer Systems, 13(1), pp. 9-18, 1997.
-
(1997)
Journal of Future Generation Computer Systems
, vol.13
, Issue.1
, pp. 9-18
-
-
Schneier, B.1
Kelsey, J.2
-
58
-
-
84871123578
-
-
Web Page
-
SIP, PRINCETON SAFE INTERNET PROGRAMMING GROUP, Web Page, http://wwu.cs.princeton.edu/sip/News.html.
-
-
-
-
59
-
-
0033293553
-
Building a high-performance, programmable secure coprocessor
-
SMITH (S.W.), WEINGART (S.H.), Building a high-performance, programmable secure coprocessor. Computer Networks and ISDN systems (Special Issue on Network Security), 31(Apr.), pp. 831-860, 1999.
-
(1999)
Computer Networks and ISDN Systems (Special Issue on Network Security)
, vol.31
, Issue.APR
, pp. 831-860
-
-
Smith, S.W.1
Weingart, S.H.2
-
60
-
-
84871133414
-
-
Security FAQ
-
SUN MICROSYSTEMS, Security FAQ. http://www.javasoft.com/sfaq.
-
-
-
-
61
-
-
0029733838
-
Mobile agent security and telescript
-
TARDO (J.), VALENTE (L.), Mobile agent security and telescript, pp. 58-63 of: IEEE Comp Con '96, 1996.
-
(1996)
IEEE Comp Con '96
, pp. 58-63
-
-
Tardo, J.1
Valente, L.2
-
62
-
-
0001982732
-
A survey of active network research
-
TENNENHOUSE (D.L.), SMITH (J.M.), SINCOSKIE (W.D.), WETHERALL (D.J.), MINDEN (G.J.), A Survey of Active Network Research, IEEE Communications Magazine, 35(1), pp. 80-86, 1997.
-
(1997)
IEEE Communications Magazine
, vol.35
, Issue.1
, pp. 80-86
-
-
Tennenhouse, D.L.1
Smith, J.M.2
Sincoskie, W.D.3
Wetherall, D.J.4
Minden, G.J.5
-
63
-
-
0343737841
-
Why the AT&T network crashed
-
TRAVIS (P.), Why the AT&T network crashed, Telephony, 218(4), pp. 11, 1990.
-
(1990)
Telephony
, vol.218
, Issue.4
, pp. 11
-
-
Travis, P.1
-
64
-
-
0002121661
-
Mobile agent security
-
Klusch, M. (ed), Springer
-
TSCHUDIN (C.), Mobile agent security, pp. 431-445 of: Klusch, M. (ed), Intelligent information agents: cooperative, rational and adaptive information gathering on the Internet, Springer, 1999.
-
(1999)
Intelligent Information Agents: Cooperative, Rational and Adaptive Information Gathering on the Internet
, pp. 431-445
-
-
Tschudin, C.1
-
66
-
-
0002717089
-
Mobile agents and security
-
Springer
-
VIGNA (G.), (ed), Mobile agents and security, Lecture Notes in Computer Science, No. 1449, Springer, 1998.
-
(1998)
Lecture Notes in Computer Science
, Issue.1449
-
-
Vigna, G.1
-
68
-
-
0038223019
-
Secure internet programming: Security issues for mobile and distributed objects
-
Springer
-
VITEK (J.), JENSEN (C.), (eds), Secure Internet programming: security issues for mobile and distributed objects. Lecture Notes in Computer Science, no 1603, Springer, 1999.
-
(1999)
Lecture Notes in Computer Science
, Issue.1603
-
-
Vitek, J.1
Jensen, C.2
-
70
-
-
84871177589
-
-
Vitek & Jensen, 1999
-
WILHELM (U.G.), STAAMANN (S.), BUTTYAN (L.), Introducing trusted third parties to the mobile agent paradigm, pp. 471-491 of: (Vitek & Jensen, 1999), 1999.
-
(1999)
Introducing Trusted Third Parties to the Mobile Agent Paradigm
, pp. 471-491
-
-
Wilhelm, U.G.1
Staamann, S.2
Buttyan, L.3
-
73
-
-
84947927799
-
Encryption tools for mobile agents: Sliding encryption
-
BIHAM, P. (ed), Fast Software Encryption, Springer
-
YOUNG (A.), YUNG (M.), Encryption tools for mobile agents: sliding encryption, pp. 230-241 of: BIHAM, P. (ed), Fast Software Encryption, Lecture Notes in Computer Science, no 1267, Springer, 1997.
-
(1997)
Lecture Notes in Computer Science
, Issue.1267
, pp. 230-241
-
-
Young, A.1
Yung, M.2
|