메뉴 건너뛰기




Volumn 23, Issue 17, 2000, Pages 1667-1676

Countermeasures for mobile agent security

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; DATA STRUCTURES; SECURITY OF DATA;

EID: 0034315517     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0140-3664(00)00253-X     Document Type: Article
Times cited : (141)

References (36)
  • 1
    • 0043222760 scopus 로고    scopus 로고
    • A language for resource-aware mobile programs
    • Vivek J., Tschudin C. Mobile Object Systems: Towards the Progammable Internet. Berlin: Springer
    • Acharya A., Ranganathan M., Sumatra J.S. A language for resource-aware mobile programs. Vivek J., Tschudin C. Mobile Object Systems: Towards the Progammable Internet. Lecture Notes in Computer Science, 1222. 1997;111-130 Springer, Berlin. (http://www.cs.umd.edu/~acha/papers/lncs97-1.html).
    • (1997) Lecture Notes in Computer Science, 1222 , pp. 111-130
    • Acharya, A.1    Ranganathan, M.2    Sumatra, J.S.3
  • 2
    • 85031548128 scopus 로고    scopus 로고
    • Agent Management, Foundation for Intelligent Physical Agents, October
    • Agent Management, FIPA. '97 Specification, part 1, version 2.0, Foundation for Intelligent Physical Agents, October 1998 (http://www.fipa.org/spec/FIPA97.html).
    • (1998) FIPA. '97 Specification, Part 1, Version 2.0
  • 4
    • 0029392001 scopus 로고
    • Itinerant agents for mobile computing
    • Chess D., et al. Itinerant agents for mobile computing. IEEE Personal Communications. 2:(5):1995;34-49.
    • (1995) IEEE Personal Communications , vol.2 , Issue.5 , pp. 34-49
    • Chess, D.1
  • 7
    • 4544373958 scopus 로고    scopus 로고
    • Understanding code mobility
    • (http://www.cs.ucsb.edu/~vigna/listpub.html)
    • Fuggetta A., Picco G.P., Vigna G. Understanding code mobility. IEEE Transactions on Software Engineering. 24:(5):1998;342-361. (http://www.cs.ucsb.edu/~vigna/listpub.html).
    • (1998) IEEE Transactions on Software Engineering , vol.24 , Issue.5 , pp. 342-361
    • Fuggetta, A.1    Picco, G.P.2    Vigna, G.3
  • 8
    • 54749142725 scopus 로고
    • Java Security Architecture (JDK 1.2)
    • Sun Microsystems, March
    • L. Gong, Java Security Architecture (JDK 1.2), Draft Document, revision 0.8, Sun Microsystems, March 1988 (http://service.felk.cvut.cz/doc/java/share/jdk1.2beta3/docs/guide/security/ spec/security-spec.doc.html).
    • (1988) Draft Document, Revision 0.8
    • Gong, L.1
  • 10
    • 85094667385 scopus 로고    scopus 로고
    • Agent Tcl: A flexible and secure mobile-agent system
    • July
    • R.S. Gray, Agent Tcl: a flexible and secure mobile-agent system, Proceedings of the Fourth Annual Tcl/Tk Workshop (TCL 96), July 1996, pp. 9-23 (http://actcomm.dartmouth.edu/papers/#security).
    • (1996) Proceedings of the Fourth Annual Tcl/Tk Workshop (TCL 96) , pp. 9-23
    • Gray, R.S.1
  • 12
    • 0001943763 scopus 로고    scopus 로고
    • Time limited Blackbox security: Protecting mobile agents from malicious hosts
    • Vinga G. Mobile Agents and Security. Berlin: Springer
    • Hohl F. Time limited Blackbox security: protecting mobile agents from malicious hosts. Vinga G. Mobile Agents and Security. Lecture Notes in Computer Science, 1419. 1998;92-113 Springer, Berlin. (http://mole.informatik.uni-stuttgart.de/papers.html).
    • (1998) Lecture Notes in Computer Science , vol.1419 , pp. 92-113
    • Hohl, F.1
  • 13
    • 0031234163 scopus 로고    scopus 로고
    • A flexible security system for using internet content
    • Islam N., et al. A flexible security system for using internet content. IEEE Software. September issue:1997;52-59.
    • (1997) IEEE Software , pp. 52-59
    • Islam, N.1
  • 14
    • 0009238051 scopus 로고    scopus 로고
    • Ad Astra Engineering Inc., Sunnyvale CA, December
    • Jumping Beans White Paper, Ad Astra Engineering Inc., Sunnyvale CA, December 1998 (http://www.jumpingbeans.com/).
    • (1998) Jumping Beans White Paper
  • 17
    • 0003802916 scopus 로고    scopus 로고
    • PhD dissertation, Department of Computer Science, University of Minnesota, October
    • N. Karnik, Security in Mobile Agent Systems, PhD dissertation, Department of Computer Science, University of Minnesota, October 1998 (http://www.cs.umn.edu/Ajanta/).
    • (1998) Security in Mobile Agent Systems
    • Karnik, N.1
  • 19
    • 0011966455 scopus 로고    scopus 로고
    • Object Management Group (OMG) Technical Committee (TC) Document orbos/97-10-05, November
    • Mobile Agent System Interoperability Facilities Specification, Object Management Group (OMG) Technical Committee (TC) Document orbos/97-10-05, November 1997 (http://www.omg.org/techprocess/meetings/schedule/Technology_Adoptions. html#tbl_MOF_Specification).
    • (1997) Mobile Agent System Interoperability Facilities Specification
  • 24
    • 0032028340 scopus 로고    scopus 로고
    • Scripting: Higher-level programming for the 21st century
    • Ousterhout J.K. Scripting: higher-level programming for the 21st century. IEEE Computer. March:1998;23-30.
    • (1998) IEEE Computer , pp. 23-30
    • Ousterhout, J.K.1
  • 25
    • 0003249402 scopus 로고    scopus 로고
    • Environmental key generation towards clueless agents
    • Vinga G. Mobile Agents and Security. Berlin: Springer
    • Riodan J., Schneier B. Environmental key generation towards clueless agents. Vinga G. Mobile Agents and Security. Lecture Notes in Computer Science, 1419. 1998;Springer, Berlin.
    • (1998) Lecture Notes in Computer Science , vol.1419
    • Riodan, J.1    Schneier, B.2
  • 27
    • 0003197918 scopus 로고    scopus 로고
    • Protecting mobile agents against malicious hosts
    • Vinga G. Mobile Agents and Security. Berlin: Springer
    • Sander T., Tschudin C. Protecting mobile agents against malicious hosts. Vinga G. Mobile Agents and Security. Lecture Notes in Computer Science, 1419. 1998;44-60 Springer, Berlin. (http://www.icsi.berkeley.edu/~tschudin/).
    • (1998) Lecture Notes in Computer Science , vol.1419 , pp. 44-60
    • Sander, T.1    Tschudin, C.2
  • 29
    • 0005417658 scopus 로고    scopus 로고
    • Mole - A Java based mobile agent system
    • M. Mühlhäuser. Berlin: Verlag. (http://mole.informatik.uni-stuttgart.de/papers.html)
    • Straber M., Baumann J., Hohl F. Mole - a Java based mobile agent system. Mühlhäuser M. Special Issues in Object Oriented Programming. 1997;301-308 Verlag, Berlin. (http://mole.informatik.uni-stuttgart.de/papers.html).
    • (1997) Special Issues in Object Oriented Programming , pp. 301-308
    • Straber, M.1    Baumann, J.2    Hohl, F.3
  • 30
    • 0029733838 scopus 로고    scopus 로고
    • Mobile agent security and telescript
    • Santa Clara, California, February 1996, IEEE Computer Society Press
    • J. Tardo, L. Valente, Mobile agent security and telescript, Proceedings of IEEE COMPSON '96, Santa Clara, California, February 1996, IEEE Computer Society Press, pp. 58-63.
    • Proceedings of IEEE COMPSON '96 , pp. 58-63
    • Tardo, J.1    Valente, L.2
  • 31
    • 0003969633 scopus 로고
    • Department of Defense, CSC-STD-001-83, Library no. S225 711, August
    • Trusted Computer System Evaluation Criteria, Department of Defense, CSC-STD-001-83, Library no. S225 711, August 1983 (http://www.cru.fr/securite/Documents-generaux/orange.book).
    • (1983) Trusted Computer System Evaluation Criteria
  • 34
    • 85031550061 scopus 로고    scopus 로고
    • Mobile agents
    • J.M. Bradshaw. Cambridge, MA: MIT Press
    • White J.E. Mobile agents. Bradshaw J.M. Software Agents, AAAI. 1997;MIT Press, Cambridge, MA.
    • (1997) Software Agents, AAAI
    • White, J.E.1
  • 35
    • 0004077062 scopus 로고    scopus 로고
    • Technical Report CS97-537, University of California in San Diego, April
    • B.S. Yee, A sanctuary for mobile agents, Technical Report CS97-537, University of California in San Diego, April 1997 (http://www.cse.ucsd.edu/users/bsy/index.html).
    • (1997) A Sanctuary for Mobile Agents
    • Yee, B.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.