메뉴 건너뛰기




Volumn 55, Issue 7, 2000, Pages 388-400

Mobile agents and telcos' nightmares

Author keywords

[No Author keywords available]

Indexed keywords

MOBILE AGENTS;

EID: 0034225108     PISSN: 00034347     EISSN: 19589395     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (8)

References (73)
  • 3
    • 0038650507 scopus 로고    scopus 로고
    • Formal syntax and semantics of Java
    • Springer
    • ALVES-FOSS J., (ed), Formal Syntax and Semantics of Java, Lecture Notes in Computer Science, no 1523. Springer, 1999.
    • (1999) Lecture Notes in Computer Science , Issue.1523
    • Alves-Foss, J.1
  • 4
    • 0000668582 scopus 로고
    • Mobile software agents for control in telecommunications networks
    • APPLEBY (S.), STEWARD (S.), Mobile software agents for control in telecommunications networks, BT Technology Journal, 12(2), pp. 104-113, 1994.
    • (1994) BT Technology Journal , vol.12 , Issue.2 , pp. 104-113
    • Appleby, S.1    Steward, S.2
  • 5
    • 84955621400 scopus 로고    scopus 로고
    • Tamper resistant software: An implementation
    • Anderson, R.J. (ed), Information Hiding 1996, Springer
    • AUCSMITH (D.), Tamper resistant software: an implementation. pp.317-333 of: Anderson, R.J. (ed), Information Hiding 1996, Lecture Notes in Computer Science, no 1174, Springer, 1996.
    • (1996) Lecture Notes in Computer Science , Issue.1174 , pp. 317-333
    • Aucsmith, D.1
  • 8
    • 0002864744 scopus 로고    scopus 로고
    • Mobile agents for network management
    • BIESZCZAD (A.), PAGUREK (B.), WHITE (T.), Mobile agents for network management, IEEE Communications Surveys, 1(1), pp. 2-9, 1998. http://www.comsoc.org/pubs/surveys.
    • (1998) IEEE Communications Surveys , vol.1 , Issue.1 , pp. 2-9
    • Bieszczad, A.1    Pagurek, B.2    White, T.3
  • 9
    • 84871176798 scopus 로고    scopus 로고
    • BRITISH STANDARDS INSTITUTION. Common criteria V1.0 Web Page, http://wuw.itsec.gov.uk/itsechtml/ccvl.o/ccvl.htm.
    • Common Criteria V1.0 Web Page
  • 10
    • 84949512878 scopus 로고    scopus 로고
    • Routing in telecommunications networks with ant-like agents
    • ALBAYRAK (S.), GARIJO (F.J.), (eds), Intelligent Agents for Telecommunications Applications '98 (IATA '98), Springer-Verlag, Berlin Germany
    • BONABEAU (E.), HENAUX (F.), GUÉRIN (S.), SNYERS (D.), KUNTZ (P.), & THERAULAZ (G.), Routing in telecommunications networks with ant-like agents, pp. 60-71 of: ALBAYRAK (S.), GARIJO (F.J.), (eds), Intelligent Agents for Telecommunications Applications '98 (IATA '98), Lecture Notes in Computer Science, no 1437, Springer-Verlag, Berlin Germany, 1998.
    • (1998) Lecture Notes in Computer Science , Issue.1437 , pp. 60-71
    • Bonabeau, E.1    Henaux, F.2    Guérin, S.3    Snyers, D.4    Kuntz, P.5    Theraulaz, G.6
  • 20
    • 84904265014 scopus 로고    scopus 로고
    • Protecting mobile web-commerce agents with smartcards
    • IEEE Computer Society
    • FUNFROCKEN (S.), Protecting mobile Web-commerce agents with smartcards, pp. 90-102 of: ASA/MA 99, IEEE Computer Society, 1999.
    • (1999) ASA/MA 99 , pp. 90-102
    • Funfrocken, S.1
  • 22
    • 0030201484 scopus 로고    scopus 로고
    • Java and the shift to net-centric computing
    • Aug.
    • HAMILTON (M.A.), Java and the Shift to Net-Centric Computing. IEEE Computer, Aug., pp. 31-39, 1996.
    • (1996) IEEE Computer , pp. 31-39
    • Hamilton, M.A.1
  • 24
    • 84957626176 scopus 로고
    • Proactive secret sharing, or: How to cope with perpetual leakage
    • COOPERSMITH (D.) (ed), Advances in Cryptology - Crypto'95, Springer
    • HERZBERG (A.), JARECKI (S.), KRAWCZUK (H.), YUNG (M.), Proactive secret sharing, or: How to cope with perpetual leakage, pp. 339-332 of: COOPERSMITH (D.) (ed), Advances in Cryptology - Crypto'95, Lecture Notes in Computer Science, no 963, Springer, 1995.
    • (1995) Lecture Notes in Computer Science , Issue.963 , pp. 339-1332
    • Herzberg, A.1    Jarecki, S.2    Krawczuk, H.3    Yung, M.4
  • 26
    • 0003954474 scopus 로고    scopus 로고
    • Tech. rept. National Institute of Standards and Technology
    • JANSEN (W.), KARYGIANNIS (T.), Mobile, agent security, Tech. rept. National Institute of Standards and Technology, 1999.
    • (1999) Mobile, Agent Security
    • Jansen, W.1    Karygiannis, T.2
  • 33
    • 0029734744 scopus 로고    scopus 로고
    • Intelligent agents: An emerging technology for next generation telecommunications?
    • MAGEDANTZ (T.), ROTHERMEL (K.), KRAUSE (S.), Intelligent agents: an emerging technology for next generation telecommunications? pp. 464-472 of: IEEE INFOCOM 1996, 1996.
    • (1996) IEEE INFOCOM 1996 , pp. 464-472
    • Magedantz, T.1    Rothermel, K.2    Krause, S.3
  • 38
    • 0005433665 scopus 로고    scopus 로고
    • Mobile code security techniques
    • May, University of Pennsylvania, Department of Computer and Information Science
    • MOORE (J.T.) (May), Mobile code security techniques. Tech. rept. MS-CIS-98-28, University of Pennsylvania, Department of Computer and Information Science, 1998 .
    • (1998) Tech. Rept. MS-CIS-98-28
    • Moore, J.T.1
  • 41
    • 84871119229 scopus 로고    scopus 로고
    • February
    • NEUMANN (P.G.), (February), RISKS DIGEST, Vol. 18, No 61, http://catless.ncl.ac.uk/Risks/, 1997a.
    • (1997) Risks Digest , vol.18 , Issue.61
    • Neumann, P.G.1
  • 42
    • 84871103829 scopus 로고    scopus 로고
    • February
    • NEUMANN (P.G.), (February), RISKS DIGEST, Vol. 18, No 82, http://catless ncl.ac.uk/Risks/, 1997b.
    • (1997) Risks Digest , vol.18 , Issue.82
    • Neumann, P.G.1
  • 43
    • 0030233817 scopus 로고    scopus 로고
    • Software agents: An, overview
    • NWANA (H.S.), Software agents: an, overview, Knowledge Engineering Review, 11(3), pp. 205-244, 1996.
    • (1996) Knowledge Engineering Review , vol.11 , Issue.3 , pp. 205-244
    • Nwana, H.S.1
  • 47
    • 84958764832 scopus 로고    scopus 로고
    • Byte code verification for Java smart cards based on model checking
    • 5th European Symposium on Research in Computer Security (ESORICS), Springer
    • POSEGGA (J.), & VOGT (H.), Byte code verification for Java smart cards based on model checking, pp. 175-190 of: 5th European Symposium on Research in Computer Security (ESORICS), Lecture Notes in Computer Science, no 1485, Springer, 1998.
    • (1998) Lecture Notes in Computer Science , Issue.1485 , pp. 175-190
    • Posegga, J.1    Vogt, H.2
  • 52
    • 0005301490 scopus 로고
    • On data banks and privacy homomorphisms
    • DE MILLO (R.A.), DOBKIN (D.P.), JONES (A.K.), & LIPTON (R.J.), (eds), Academic Press
    • RIVEST (R.L.), ADLEMAN (L.), DERTOUZOS (M.L), On data banks and privacy homomorphisms, pp. 169-177 of: DE MILLO (R.A.), DOBKIN (D.P.), JONES (A.K.), & LIPTON (R.J.), (eds), Foundations of Secure Computing. Academic Press, 1978.
    • (1978) Foundations of Secure Computing , pp. 169-177
    • Rivest, R.L.1    Adleman, L.2    Dertouzos, M.L.3
  • 57
    • 0031177289 scopus 로고    scopus 로고
    • Remote auditing of software outputs using a trusted coprocessor
    • SCHNEIER (B.), KELSEY (J.), Remote Auditing of Software Outputs Using a Trusted Coprocessor, Journal of Future Generation Computer Systems, 13(1), pp. 9-18, 1997.
    • (1997) Journal of Future Generation Computer Systems , vol.13 , Issue.1 , pp. 9-18
    • Schneier, B.1    Kelsey, J.2
  • 58
    • 84871123578 scopus 로고    scopus 로고
    • Web Page
    • SIP, PRINCETON SAFE INTERNET PROGRAMMING GROUP, Web Page, http://wwu.cs.princeton.edu/sip/News.html.
  • 60
    • 84871133414 scopus 로고    scopus 로고
    • Security FAQ
    • SUN MICROSYSTEMS, Security FAQ. http://www.javasoft.com/sfaq.
  • 61
    • 0029733838 scopus 로고    scopus 로고
    • Mobile agent security and telescript
    • TARDO (J.), VALENTE (L.), Mobile agent security and telescript, pp. 58-63 of: IEEE Comp Con '96, 1996.
    • (1996) IEEE Comp Con '96 , pp. 58-63
    • Tardo, J.1    Valente, L.2
  • 63
    • 0343737841 scopus 로고
    • Why the AT&T network crashed
    • TRAVIS (P.), Why the AT&T network crashed, Telephony, 218(4), pp. 11, 1990.
    • (1990) Telephony , vol.218 , Issue.4 , pp. 11
    • Travis, P.1
  • 66
    • 0002717089 scopus 로고    scopus 로고
    • Mobile agents and security
    • Springer
    • VIGNA (G.), (ed), Mobile agents and security, Lecture Notes in Computer Science, No. 1449, Springer, 1998.
    • (1998) Lecture Notes in Computer Science , Issue.1449
    • Vigna, G.1
  • 68
    • 0038223019 scopus 로고    scopus 로고
    • Secure internet programming: Security issues for mobile and distributed objects
    • Springer
    • VITEK (J.), JENSEN (C.), (eds), Secure Internet programming: security issues for mobile and distributed objects. Lecture Notes in Computer Science, no 1603, Springer, 1999.
    • (1999) Lecture Notes in Computer Science , Issue.1603
    • Vitek, J.1    Jensen, C.2
  • 73
    • 84947927799 scopus 로고    scopus 로고
    • Encryption tools for mobile agents: Sliding encryption
    • BIHAM, P. (ed), Fast Software Encryption, Springer
    • YOUNG (A.), YUNG (M.), Encryption tools for mobile agents: sliding encryption, pp. 230-241 of: BIHAM, P. (ed), Fast Software Encryption, Lecture Notes in Computer Science, no 1267, Springer, 1997.
    • (1997) Lecture Notes in Computer Science , Issue.1267 , pp. 230-241
    • Young, A.1    Yung, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.