-
1
-
-
0043222760
-
A language for resource-aware mobile programs
-
Vivek J., Tschudin C. Mobile Object Systems: Towards the Progammable Internet. Berlin: Springer
-
Acharya A., Ranganathan M., Sumatra J.S. A language for resource-aware mobile programs. Vivek J., Tschudin C. Mobile Object Systems: Towards the Progammable Internet. Lecture Notes in Computer Science, 1222. 1997;111-130 Springer, Berlin. (http://www.cs.umd.edu/~acha/papers/lncs97-1.html).
-
(1997)
Lecture Notes in Computer Science, 1222
, pp. 111-130
-
-
Acharya, A.1
Ranganathan, M.2
Sumatra, J.S.3
-
2
-
-
85031548128
-
-
Agent Management, Foundation for Intelligent Physical Agents, October
-
Agent Management, FIPA. '97 Specification, part 1, version 2.0, Foundation for Intelligent Physical Agents, October 1998 (http://www.fipa.org/spec/FIPA97.html).
-
(1998)
FIPA. '97 Specification, Part 1, Version 2.0
-
-
-
4
-
-
0029392001
-
Itinerant agents for mobile computing
-
Chess D., et al. Itinerant agents for mobile computing. IEEE Personal Communications. 2:(5):1995;34-49.
-
(1995)
IEEE Personal Communications
, vol.2
, Issue.5
, pp. 34-49
-
-
Chess, D.1
-
5
-
-
0012073784
-
JRes: A Resource Accounting Interface for Java
-
Vancouver, Canada, October
-
G. Czajkowski, T. von Eicken, JRes: A Resource Accounting Interface for Java, ACM Conference on Object Oriented Languages and Systems (OOPSLA), Vancouver, Canada, October 1998.
-
(1998)
ACM Conference on Object Oriented Languages and Systems (OOPSLA)
-
-
Czajkowski, G.1
Von Eicken, T.2
-
6
-
-
85085848836
-
Security for mobile agents: Authentication and state appraisal
-
W. Farmer, J. Guttman, V. Swarup, Security for mobile agents: authentication and state appraisal, Proceedings of the 4th European Symposium on Research in Computer Security (ESORICS'96), 1966, pp. 118-130.
-
(1966)
Proceedings of the 4th European Symposium on Research in Computer Security (ESORICS'96)
, pp. 118-130
-
-
Farmer, W.1
Guttman, J.2
Swarup, V.3
-
8
-
-
54749142725
-
Java Security Architecture (JDK 1.2)
-
Sun Microsystems, March
-
L. Gong, Java Security Architecture (JDK 1.2), Draft Document, revision 0.8, Sun Microsystems, March 1988 (http://service.felk.cvut.cz/doc/java/share/jdk1.2beta3/docs/guide/security/ spec/security-spec.doc.html).
-
(1988)
Draft Document, Revision 0.8
-
-
Gong, L.1
-
10
-
-
85094667385
-
Agent Tcl: A flexible and secure mobile-agent system
-
July
-
R.S. Gray, Agent Tcl: a flexible and secure mobile-agent system, Proceedings of the Fourth Annual Tcl/Tk Workshop (TCL 96), July 1996, pp. 9-23 (http://actcomm.dartmouth.edu/papers/#security).
-
(1996)
Proceedings of the Fourth Annual Tcl/Tk Workshop (TCL 96)
, pp. 9-23
-
-
Gray, R.S.1
-
12
-
-
0001943763
-
Time limited Blackbox security: Protecting mobile agents from malicious hosts
-
Vinga G. Mobile Agents and Security. Berlin: Springer
-
Hohl F. Time limited Blackbox security: protecting mobile agents from malicious hosts. Vinga G. Mobile Agents and Security. Lecture Notes in Computer Science, 1419. 1998;92-113 Springer, Berlin. (http://mole.informatik.uni-stuttgart.de/papers.html).
-
(1998)
Lecture Notes in Computer Science
, vol.1419
, pp. 92-113
-
-
Hohl, F.1
-
13
-
-
0031234163
-
A flexible security system for using internet content
-
Islam N., et al. A flexible security system for using internet content. IEEE Software. September issue:1997;52-59.
-
(1997)
IEEE Software
, pp. 52-59
-
-
Islam, N.1
-
14
-
-
0009238051
-
-
Ad Astra Engineering Inc., Sunnyvale CA, December
-
Jumping Beans White Paper, Ad Astra Engineering Inc., Sunnyvale CA, December 1998 (http://www.jumpingbeans.com/).
-
(1998)
Jumping Beans White Paper
-
-
-
15
-
-
0000709927
-
Protecting the computation results of free-roaming agents
-
Stuttgart, Germany, September
-
G. Karjoth, N. Asokan, C. Gülcü, Protecting the computation results of free-roaming agents, Proceedings of the Second International Workshop on Mobile Agents, Stuttgart, Germany, September 1998.
-
(1998)
Proceedings of the Second International Workshop on Mobile Agents
-
-
Karjoth, G.1
Asokan, N.2
Gülcü, C.3
-
17
-
-
0003802916
-
-
PhD dissertation, Department of Computer Science, University of Minnesota, October
-
N. Karnik, Security in Mobile Agent Systems, PhD dissertation, Department of Computer Science, University of Minnesota, October 1998 (http://www.cs.umn.edu/Ajanta/).
-
(1998)
Security in Mobile Agent Systems
-
-
Karnik, N.1
-
19
-
-
0011966455
-
-
Object Management Group (OMG) Technical Committee (TC) Document orbos/97-10-05, November
-
Mobile Agent System Interoperability Facilities Specification, Object Management Group (OMG) Technical Committee (TC) Document orbos/97-10-05, November 1997 (http://www.omg.org/techprocess/meetings/schedule/Technology_Adoptions. html#tbl_MOF_Specification).
-
(1997)
Mobile Agent System Interoperability Facilities Specification
-
-
-
20
-
-
85084097858
-
Safe kernel extensions without run-time checking
-
Seattle, Washington, October
-
G. Necula, P. Lee, Safe kernel extensions without run-time checking, Proceedings of the 2nd Symposium on Operating System Design and Implementation (OSDI '96), Seattle, Washington, October 1996, pp. 229-243 (http://www.cs.cmu.edu/~necula/papers.html).
-
(1996)
Proceedings of the 2nd Symposium on Operating System Design and Implementation (OSDI '96)
, pp. 229-243
-
-
Necula, G.1
Lee, P.2
-
23
-
-
0003613073
-
-
Technical Report SMLI TR-97-60, Sun Microsystems
-
J.K. Ousterhout, J.Y. Levy, B.B. Welch, The safe-Tcl security model, Technical Report SMLI TR-97-60, Sun Microsystems, 1997.
-
(1997)
The Safe-tcl Security Model
-
-
Ousterhout, J.K.1
Levy, J.Y.2
Welch, B.B.3
-
24
-
-
0032028340
-
Scripting: Higher-level programming for the 21st century
-
Ousterhout J.K. Scripting: higher-level programming for the 21st century. IEEE Computer. March:1998;23-30.
-
(1998)
IEEE Computer
, pp. 23-30
-
-
Ousterhout, J.K.1
-
25
-
-
0003249402
-
Environmental key generation towards clueless agents
-
Vinga G. Mobile Agents and Security. Berlin: Springer
-
Riodan J., Schneier B. Environmental key generation towards clueless agents. Vinga G. Mobile Agents and Security. Lecture Notes in Computer Science, 1419. 1998;Springer, Berlin.
-
(1998)
Lecture Notes in Computer Science
, vol.1419
-
-
Riodan, J.1
Schneier, B.2
-
27
-
-
0003197918
-
Protecting mobile agents against malicious hosts
-
Vinga G. Mobile Agents and Security. Berlin: Springer
-
Sander T., Tschudin C. Protecting mobile agents against malicious hosts. Vinga G. Mobile Agents and Security. Lecture Notes in Computer Science, 1419. 1998;44-60 Springer, Berlin. (http://www.icsi.berkeley.edu/~tschudin/).
-
(1998)
Lecture Notes in Computer Science
, vol.1419
, pp. 44-60
-
-
Sander, T.1
Tschudin, C.2
-
29
-
-
0005417658
-
Mole - A Java based mobile agent system
-
M. Mühlhäuser. Berlin: Verlag. (http://mole.informatik.uni-stuttgart.de/papers.html)
-
Straber M., Baumann J., Hohl F. Mole - a Java based mobile agent system. Mühlhäuser M. Special Issues in Object Oriented Programming. 1997;301-308 Verlag, Berlin. (http://mole.informatik.uni-stuttgart.de/papers.html).
-
(1997)
Special Issues in Object Oriented Programming
, pp. 301-308
-
-
Straber, M.1
Baumann, J.2
Hohl, F.3
-
30
-
-
0029733838
-
Mobile agent security and telescript
-
Santa Clara, California, February 1996, IEEE Computer Society Press
-
J. Tardo, L. Valente, Mobile agent security and telescript, Proceedings of IEEE COMPSON '96, Santa Clara, California, February 1996, IEEE Computer Society Press, pp. 58-63.
-
Proceedings of IEEE COMPSON '96
, pp. 58-63
-
-
Tardo, J.1
Valente, L.2
-
31
-
-
0003969633
-
-
Department of Defense, CSC-STD-001-83, Library no. S225 711, August
-
Trusted Computer System Evaluation Criteria, Department of Defense, CSC-STD-001-83, Library no. S225 711, August 1983 (http://www.cru.fr/securite/Documents-generaux/orange.book).
-
(1983)
Trusted Computer System Evaluation Criteria
-
-
-
33
-
-
0027836576
-
Efficient software-based fault isolation
-
December
-
R. Wahbe, S. Lucco, T. Anderson, Efficient software-based fault isolation, Proceedings of the 14th ACM Symposium on Operating Systems Principles, ACM SIGOPS Operating Systems Review, December 1993, pp. 203-216 (http://www.cs.washington.edu/homes/tom/).
-
(1993)
Proceedings of the 14th ACM Symposium on Operating Systems Principles, ACM SIGOPS Operating Systems Review
, pp. 203-216
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T.3
-
34
-
-
85031550061
-
Mobile agents
-
J.M. Bradshaw. Cambridge, MA: MIT Press
-
White J.E. Mobile agents. Bradshaw J.M. Software Agents, AAAI. 1997;MIT Press, Cambridge, MA.
-
(1997)
Software Agents, AAAI
-
-
White, J.E.1
-
35
-
-
0004077062
-
-
Technical Report CS97-537, University of California in San Diego, April
-
B.S. Yee, A sanctuary for mobile agents, Technical Report CS97-537, University of California in San Diego, April 1997 (http://www.cse.ucsd.edu/users/bsy/index.html).
-
(1997)
A Sanctuary for Mobile Agents
-
-
Yee, B.S.1
|