메뉴 건너뛰기




Volumn 21, Issue 4, 2003, Pages 146-152

Authentication with P2P agents

Author keywords

[No Author keywords available]

Indexed keywords

CLIENT SERVER COMPUTER SYSTEMS; COMPUTER ARCHITECTURE; COMPUTER NETWORKS; COMPUTER SOFTWARE MAINTENANCE; CONSTRAINT THEORY; CRYPTOGRAPHY; DATA COMMUNICATION SYSTEMS; SOFTWARE AGENTS;

EID: 0344185359     PISSN: 13583948     EISSN: None     Source Type: Journal    
DOI: 10.1023/A:1027399908231     Document Type: Article
Times cited : (4)

References (27)
  • 2
    • 0345046487 scopus 로고    scopus 로고
    • Human authentication, the Achilles heel of secure systems
    • O'Gorman L: 'Human authentication, the Achilles heel of secure systems', (2002) http://www.research.avayalabs.com/user/logorman/UA_Stevens.ppt
    • (2002)
    • O'Gorman, L.1
  • 3
    • 0009901943 scopus 로고    scopus 로고
    • Security focused
    • Online report on information system security
    • Briney A: 'Security focused', Online report on information system security (2000) - http://www.infosecuritymag.com
    • (2000)
    • Briney, A.1
  • 4
    • 0344184104 scopus 로고    scopus 로고
    • PKI security for JXTA overlay networks
    • Altman J: 'PKI security for JXTA overlay networks', (2003) - http://www.jxta.org/docs/pki-security-for-jxta.pdf
    • (2003)
    • Altman, J.1
  • 6
    • 26544441130 scopus 로고    scopus 로고
    • An open innovative collaboration
    • Project JXTA
    • Project JXTA: 'An Open Innovative Collaboration' - http://www.jxta.org/project/www/docs/OpenInnovative.pdf
  • 7
    • 0010344835 scopus 로고    scopus 로고
    • Poblano: A distributed trust model for peer-to-peer networks
    • Chen R and Yeager W: 'Poblano: a distributed trust model for peer-to-peer networks', (2003) - http://www.jxta.org/docs/trust.pdf
    • (2003)
    • Chen, R.1    Yeager, W.2
  • 11
    • 0043139094 scopus 로고    scopus 로고
    • Agents that buy and sell: Transforming commerce as we know it
    • (March)
    • Maes P, Guttman R and Moukas A: 'Agents that buy and sell: transforming commerce as we know it', Communications of the ACM (March 1999) - http://www.media.mit.edu/
    • (1999) Communications of the ACM
    • Maes, P.1    Guttman, R.2    Moukas, A.3
  • 15
    • 0345477916 scopus 로고    scopus 로고
    • JADE
    • JADE - http://jade.cselt.it/
  • 16
    • 0032121071 scopus 로고    scopus 로고
    • The ZEUS agent building tool-kit
    • (July)
    • Collis J C et al.: 'The ZEUS agent building tool-kit', BT Technol J, 16, No 3, pp 60-68 (July 1998).
    • (1998) BT Technol J , vol.16 , Issue.3 , pp. 60-68
    • Collis, J.C.1
  • 17
    • 0344184103 scopus 로고    scopus 로고
    • IBM Able Bean
    • IBM Able Bean - http://www.alphaworks.ibm.com/tech/able/
  • 18
    • 33751099026 scopus 로고    scopus 로고
    • Distributed systems topologies
    • Minar N: 'Distributed systems topologies', (2001) - http://www.openp2p.com/pub/a/p2p/2001/12/14/topologies_one.html
    • (2001)
    • Minar, N.1
  • 19
    • 0003700417 scopus 로고
    • Kerberos authentication and authorisation system
    • MIT Project Athena, Cambridge, Massachusetts (December)
    • Miller S P, Neuman B C, Schiller J I and Saltzer J H: 'Kerberos authentication and authorisation system', MIT Project Athena, Cambridge, Massachusetts (December 1987).
    • (1987)
    • Miller, S.P.1    Neuman, B.C.2    Schiller, J.I.3    Saltzer, J.H.4
  • 20
    • 0003750241 scopus 로고    scopus 로고
    • An architecture for intrusion detection using autonomous agents
    • Department of Computer Sciences, Purdue University, Coast TR 98-05
    • Balasubramaniyan J, Garcia-Fernandez J O, Spafford E and Zamboni D: 'An architecture for intrusion detection using autonomous agents', Department of Computer Sciences, Purdue University, Coast TR 98-05 (1998).
    • (1998)
    • Balasubramaniyan, J.1    Garcia-Fernandez, J.O.2    Spafford, E.3    Zamboni, D.4
  • 24
    • 0000393542 scopus 로고    scopus 로고
    • A logic-based knowledge representation for authorization with delegation
    • (extended abstract); (Full version is IBM Research Report RC 21492)
    • Li N, Feigenbaum J and Grosof B N: 'A logic-based knowledge representation for authorization with delegation', (extended abstract) 12th Intl IEEE Computer Security Foundations Workshop (1999) (Full version is IBM Research Report RC 21492).
    • (1999) 12th Intl IEEE Computer Security Foundations Workshop
    • Li, N.1    Feigenbaum, J.2    Grosof, B.N.3
  • 25
    • 0345477914 scopus 로고    scopus 로고
    • Cougaar
    • Cougaar - http://www.cougaar.org/
  • 26
    • 0344615673 scopus 로고    scopus 로고
    • Tryllian
    • Tryllian - http://www.tryllian.com/
  • 27
    • 0344184102 scopus 로고    scopus 로고
    • Web Services
    • Web Services - http://www.oasis-open.org/committees/security/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.