메뉴 건너뛰기




Volumn 14, Issue 5, 2002, Pages 211-218

Mobile agent security

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; MOBILE TELECOMMUNICATION SYSTEMS; SECURITY OF DATA; SOFTWARE AGENTS;

EID: 0036804023     PISSN: 09540695     EISSN: None     Source Type: Journal    
DOI: 10.1049/ecej:20020504     Document Type: Article
Times cited : (126)

References (22)
  • 2
    • 0035657384 scopus 로고    scopus 로고
    • A conceptual framework for agent definition and development
    • Luck, M., and D'inverno, M.: 'A conceptual framework for agent definition and development', Comput. J. (UK), 2001, 44, (1), pp.1-20.
    • (2001) Comput. J. (UK) , vol.44 , Issue.1 , pp. 1-20
    • Luck, M.1    D'inverno, M.2
  • 6
    • 84972263711 scopus 로고
    • Intelligent agents: Theory and practice
    • Jennings, N.R., and Wooldridge, M.: 'Intelligent agents: theory and practice', Knowl. Eng. Rev., 1995, 10, (2), pp.115-152.
    • (1995) Knowl. Eng. Rev. , vol.10 , Issue.2 , pp. 115-152
    • Jennings, N.R.1    Wooldridge, M.2
  • 8
    • 84982994321 scopus 로고    scopus 로고
    • Introducing trusted third parties to the mobile agent paradigm
    • Vitek, J., and Jensen, C. (Eds.): Secure Internet programming, Springer-Verlag, New York, NY, USA
    • Wilhelm, U.G., Staamann, S., and Buttyan, L.: 'Introducing trusted third parties to the mobile agent paradigm', in Vitek, J., and Jensen, C. (Eds.): 'Secure Internet programming', Vol. 1603 in LNCS, (Springer-Verlag, New York, NY, USA, 1999), pp.471-491.
    • (1999) LNCS , vol.1603 , pp. 471-491
    • Wilhelm, U.G.1    Staamann, S.2    Buttyan, L.3
  • 9
    • 0011232840 scopus 로고    scopus 로고
    • On mobile agent based transactions in moderately hostile environments
    • De Decker, B., Piessens, F., Smits, J., and Van Herreweghen, E. (Eds.): 'Advances in network and distributed systems security'. KU Leuven, Belgium, November 2001, (Kluwer Academic Publishers, Boston
    • Borselius, N., Mitchell, C.J., and Wilson, A.T.: 'On mobile agent based transactions in moderately hostile environments', in De Decker, B., Piessens, F., Smits, J., and Van Herreweghen, E. (Eds.): 'Advances in network and distributed systems security'. Proc. IFIP TC11 WG11.4 First Annual Working Conf. on Network Security, KU Leuven, Belgium, November 2001, (Kluwer Academic Publishers, Boston, 2001), pp.173-186.
    • (2001) Proc. IFIP TC11 WG11.4 First Annual Working Conf. on Network Security , pp. 173-186
    • Borselius, N.1    Mitchell, C.J.2    Wilson, A.T.3
  • 11
    • 33846619550 scopus 로고    scopus 로고
    • Towards fault-tolerant and secure agentry
    • Mavronicolas, M., and Tsigas, P. (Eds.): Eleventh International Workshop on Distributed Algorithms, Springer-Verlag, Berlin, September
    • Schneider, F.B.: Towards fault-tolerant and secure agentry', in Mavronicolas, M., and Tsigas, P. (Eds.): 'Eleventh International Workshop on Distributed Algorithms', Vol. 1320 in LNCS, (Springer-Verlag, Berlin, September 1997), pp.1-14.
    • (1997) LNCS , vol.1320 , pp. 1-14
    • Schneider, F.B.1
  • 13
    • 84982946701 scopus 로고    scopus 로고
    • A sanctuary for mobile agents
    • Vitek, J., and Jensen, C. (Eds.): Secure Internet programming, Springer-Verlag, New York, NY, USA
    • Yee, B.: 'A sanctuary for mobile agents', in Vitek, J., and Jensen, C. (Eds.): 'Secure Internet programming', Vol. 1603 in LNCS, (Springer-Verlag, New York, NY, USA, 1999), pp.261-274.
    • (1999) LNCS , vol.1603 , pp. 261-274
    • Yee, B.1
  • 14
    • 84947927799 scopus 로고    scopus 로고
    • Sliding encryption: A cryptographic tool for mobile agents
    • 20th-22nd January 1997, Haifa, Israel Proc. 4th Int. Workshop on Fast Software Encryption, FSE '97, Springer-Verlag, Berlin
    • Young, A., and Yung, M.: 'Sliding encryption: a cryptographic tool for mobile agents'. Proc. 4th Int. Workshop on Fast Software Encryption, FSE '97, 20th-22nd January 1997, Haifa, Israel, Vol. 1267 in LNCS, (Springer-Verlag, Berlin, 1997).
    • (1997) LNCS , vol.1267
    • Young, A.1    Yung, M.2
  • 15
    • 0003249402 scopus 로고    scopus 로고
    • Environmental key generation towards clueless agents
    • Vigna, G. (Ed.): Mobile agents and security, Springer-Verlag, Berlin
    • Riordan, J., and Schneier, B.: 'Environmental key generation towards clueless agents', in Vigna, G. (Ed.): 'Mobile agents and security', Vol. 1419 in LNCS, (Springer-Verlag, Berlin, 1998), pp.15-24.
    • (1998) LNCS , vol.1419 , pp. 15-24
    • Riordan, J.1    Schneier, B.2
  • 17
    • 79251578513 scopus 로고    scopus 로고
    • On the (im)possibility of obfuscating programs
    • Kilian, J. (Ed.): Proceedings of the 21st Annual International Cryptology Conference, Springer-Verlag, Berlin
    • Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S., and Yang, K.: 'On the (im)possibility of obfuscating programs', in Kilian, J. (Ed.): 'Proceedings of the 21st Annual International Cryptology Conference', Vol. 2139 in LNCS, (Springer-Verlag, Berlin, 2001), pp. 1-18.
    • (2001) LNCS , vol.2139 , pp. 1-18
    • Barak, B.1    Goldreich, O.2    Impagliazzo, R.3    Rudich, S.4    Sahai, A.5    Vadhan, S.6    Yang, K.7
  • 18
    • 0001943763 scopus 로고    scopus 로고
    • Time limited blackbox security: Protecting mobile agents from malicious hosts
    • Vigna, G. (Ed.): Mobile agents and security, Springer-Verlag, Berlin
    • Hohl, E: 'Time limited blackbox security: protecting mobile agents from malicious hosts', in VIGNA, G. (Ed.): 'Mobile agents and security', Vol. 1419 in LNCS, (Springer-Verlag, Berlin, 1998), pp.92-113.
    • (1998) LNCS , vol.1419 , pp. 92-113
    • Hohl, E.1
  • 19
    • 84958968002 scopus 로고    scopus 로고
    • Secure transactions with mobile agents in hostile environments
    • Dawson, E., Clark, A., and Boyd, C. (Eds.): Information security and privacy: Proceedings of the 5th Australian Conference - ACISP 2000, Springer-Verlag, Berlin
    • Kotzanikolaou, P., Burmester, M., and Chrissikopoulos, V.: 'Secure transactions with mobile agents in hostile environments', in Dawson, E., Clark, A., and Boyd, C. (Eds.): 'Information security and privacy: Proceedings of the 5th Australian Conference - ACISP 2000', Vol. 1841 in LNCS, (Springer-Verlag, Berlin, 2000), pp.289-297.
    • (2000) LNCS , vol.1841 , pp. 289-297
    • Kotzanikolaou, P.1    Burmester, M.2    Chrissikopoulos, V.3
  • 20
    • 0001800257 scopus 로고    scopus 로고
    • Safe, untrusted agents using proof-carrying code
    • Vigna, G. (Ed.): Mobile agents and security, Springer-Verlag, Berlin
    • Necula, G.C., and Lee, P.: 'Safe, untrusted agents using proof-carrying code', in VIGNA, G. (Ed.): 'Mobile agents and security', Vol. 1419 in LNCS, (Springer-Verlag, Berlin, 1998), pp.61-91.
    • (1998) LNCS , vol.1419 , pp. 61-91
    • Necula, G.C.1    Lee, P.2
  • 21
    • 84949751564 scopus 로고    scopus 로고
    • Security for mobile agents: Authentication and state appraisal
    • Bertino, E., Kurth, H., Martella, G., and Montolivo, E. (Eds.): Proceedings of the European Symposium on Research in Computer Security (ESORICS), Springer-Verlag, Berlin
    • Farmer, W., Guttmann, J., and Swarup, V.: 'Security for mobile agents: authentication and state appraisal', in Bertino, E., Kurth, H., Martella, G., and Montolivo, E. (Eds.): 'Proceedings of the European Symposium on Research in Computer Security (ESORICS)', Vol. 1146 in LNCS, (Springer-Verlag, Berlin, 1996), pp.118-130.
    • (1996) LNCS , vol.1146 , pp. 118-130
    • Farmer, W.1    Guttmann, J.2    Swarup, V.3
  • 22
    • 0036040947 scopus 로고    scopus 로고
    • A security architecture for agent-based mobile systems
    • Proc. 3rd Int. Conf. on Mobile Communications Technologies, 3G2002, London, UK, May
    • Borselius, N., Hur, N., Kaprynski, M., and Mitchell, C.J., 3rd Int. Conf. on Mobile Communications Technologies, 3G2002, London, UK, May 2002, IEE Conf. Publ. No. 489, pp.312-318.
    • (2002) IEE Conf. Publ. , vol.489 , pp. 312-318
    • Borselius, N.1    Hur, N.2    Kaprynski, M.3    Mitchell, C.J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.