-
1
-
-
84949751564
-
Security for mobile agents: Authentication and state appraisal
-
W. M. Farmer, J. D. Guttmann, and V. Swarup, "Security for Mobile Agents: Authentication and State Appraisal," Proceedings of the 4th European Symposium on Research in Computer Security, No. 1146, pp. 118-130, 1996.
-
(1996)
Proceedings of the 4th European Symposium on Research in Computer Security
, Issue.1146
, pp. 118-130
-
-
Farmer, W.M.1
Guttmann, J.D.2
Swarup, V.3
-
2
-
-
0002584180
-
Security for mobile agents: Issues and requirements
-
W. M. Farmer, J. D. Guttmann, and V. Swarup, "Security for Mobile Agents: Issues and Requirements," Proceedings of the 19th National Information Systems Security Conference, Vol. 2, pp. 591-597, 1996.
-
(1996)
Proceedings of the 19th National Information Systems Security Conference
, vol.2
, pp. 591-597
-
-
Farmer, W.M.1
Guttmann, J.D.2
Swarup, V.3
-
4
-
-
0001943763
-
Time limited blackbox security: Protecting mobile agents from malicious hosts
-
Mobile Agents and Security
-
F. Hohl, "Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts," Mobile Agents and Security, LNCS 1419, pp. 92-113, 1998.
-
(1998)
LNCS
, vol.1419
, pp. 92-113
-
-
Hohl, F.1
-
5
-
-
84958968002
-
Secure transactions with mobile agents in hostile environments
-
ACISP 2000
-
P. Kotzanikolaou, M. Burmester, and V. Chrissikopoulos, "Secure Transactions with Mobile Agents in Hostile Environments," ACISP 2000, LNCS 1841, pp. 289 - 297, 2000.
-
(2000)
LNCS
, vol.1841
, pp. 289-297
-
-
Kotzanikolaou, P.1
Burmester, M.2
Chrissikopoulos, V.3
-
8
-
-
0003197918
-
Protecting mobile agents against malicious hosts
-
Mobile Agents and Security
-
T. Sander, C. F. Tschudin, "Protecting Mobile Agents against Malicious Hosts," Mobile Agents and Security, Lecture Notes in Computer Science 1419, pp.44-60, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1419
, pp. 44-60
-
-
Sander, T.1
Tschudin, C.F.2
-
12
-
-
84957613488
-
Petri nets as token objects - An introduction to elementary object nets
-
19th Intl. Conference on Application and Theory of Petri Nets
-
R. Valk, "Petri Nets as Token Objects - An Introduction to Elementary Object Nets," 19th Intl. Conference on Application and Theory of Petri Nets, LNCS 1420, pp. 1-25, 1998.
-
(1998)
LNCS
, vol.1420
, pp. 1-25
-
-
Valk, R.1
-
13
-
-
14944378009
-
Concurrency in communicating object petri nets
-
Concurrent Object-Oriented Programming and Petri Nets
-
R. Valk, "Concurrency in Communicating Object Petri Nets," Concurrent Object-Oriented Programming and Petri Nets, LNCS2001, pp. 164-195, 2001.
-
(2001)
LNCS2001
, pp. 164-195
-
-
Valk, R.1
-
15
-
-
84956985232
-
Seal: A framework for secure mobile computations
-
Internet Programming Languages
-
J. Vitek, and G. Castagna, "Seal: a Framework for Secure Mobile Computations," Internet Programming Languages, LNCS 1686, 1999.
-
(1999)
LNCS
, vol.1686
-
-
Vitek, J.1
Castagna, G.2
-
16
-
-
0002717089
-
Cryptographic traces for mobile agents
-
Mobile Agents and Security
-
G. Vigna, "Cryptographic Traces for Mobile Agents," Mobile Agents and Security, LNCS1419, pp.137-150, 1998.
-
(1998)
LNCS
, vol.1419
, pp. 137-150
-
-
Vigna, G.1
-
17
-
-
0037250973
-
A formal architectural model for logical agent mobility
-
January
-
D. Xu, J. Yin, Y. Deng and J. Ding, "A Formal Architectural Model for Logical Agent Mobility," IEEE Transactions on Software Engineering, vol. 29, no. 1, pp. 31 - 45, January 2003.
-
(2003)
IEEE Transactions on Software Engineering
, vol.29
, Issue.1
, pp. 31-45
-
-
Xu, D.1
Yin, J.2
Deng, Y.3
Ding, J.4
|