메뉴 건너뛰기




Volumn 63, Issue , 2002, Pages 111-126

Path-based security for mobile agents

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; COMPUTER SYSTEMS PROGRAMMING; CRYPTOGRAPHY; ENCODING (SYMBOLS); HUMAN COMPUTER INTERACTION; INTERNET; INTRANETS; MOBILE COMPUTING; SECURITY OF DATA;

EID: 18944371073     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/S1571-0661(04)80340-2     Document Type: Conference Paper
Times cited : (2)

References (28)
  • 3
    • 18944407823 scopus 로고    scopus 로고
    • User- level resource-constrained sandboxing
    • Chang F., Itzkovitz A., and Karamcheti, V. Secure, User- level Resource-constrained Sandboxing. TR1999-795, 1999.
    • (1999) TR1999-795
    • Chang, F.1    Itzkovitz, A.2    Secure, K.V.3
  • 7
    • 18944390720 scopus 로고    scopus 로고
    • A framework to protect mobile agents by using reference states
    • Universitt Stuttgart
    • Hohl, F. A Framework to Protect Mobile Agents by Using Reference States. Technical Report Nr. 2000/03, Universitt Stuttgart, 2000.
    • (2000) Technical Report Nr. 2000/03 , vol.2000 , Issue.3
    • Hohl, F.1
  • 8
    • 0001943763 scopus 로고    scopus 로고
    • Time limited blackbox security: Protecting mobile agents from malicious hosts
    • G. Vigna. Springer-Verlag
    • Hohl F. Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts. Vigna G. Mobile Agents and Security. 1998;Springer-Verlag
    • (1998) Mobile Agents and Security
    • Hohl, F.1
  • 11
    • 84958968002 scopus 로고    scopus 로고
    • Secure transactions with mobile agents in hostile environments
    • Dawson, E., Clark, A., and Boyd, C. Information Security and Privacy Springer-Verlag
    • Kotzanikolaou, P., Burmester M., and Chrissikopoulos, V. Secure Transactions with Mobile Agents in Hostile Environments. In Dawson, E., Clark, A., and Boyd, C. Information Security and Privacy. LNCS Vol. 1841, Springer-Verlag, pages 289-297, 2000
    • (2000) LNCS , vol.1841 , pp. 289-297
    • Kotzanikolaou, P.1    Burmester, M.2    Chrissikopoulos, V.3
  • 16
    • 0032028340 scopus 로고    scopus 로고
    • Scripting: Higher-Level Programming for the 21st Century
    • Ousterhout J.K. Scripting: Higher-Level Programming for the 21st Century. IEEE Computer. 1998;23-30
    • (1998) IEEE Computer , pp. 23-30
    • Ousterhout, J.K.1
  • 17
    • 0003249402 scopus 로고    scopus 로고
    • Environmental Key Generation Towards Clueless Agents
    • G. Vigna. Springer-Verlag
    • Riordan J., Schneier B. Environmental Key Generation Towards Clueless Agents. Vigna G. Mobile Agents and Security. 1998;Springer-Verlag
    • (1998) Mobile Agents and Security
    • Riordan, J.1    Schneier, B.2
  • 18
    • 0003197918 scopus 로고    scopus 로고
    • Protecting Mobile Agents Against Malicious Hosts
    • G. Vigna. Springer-Verlag
    • Sander T., Tschudin C.F. Protecting Mobile Agents Against Malicious Hosts. Vigna G. Mobile Agents and Security. 1997;Springer-Verlag
    • (1997) Mobile Agents and Security
    • Sander, T.1    Tschudin, C.F.2
  • 23
    • 0002717089 scopus 로고    scopus 로고
    • Cryptographic Traces for Mobile Agents
    • G. Vigna. Springer-Verlag
    • Vigna G. Cryptographic Traces for Mobile Agents. Vigna G. Mobile Agents and Security. 1998;37-153 Springer-Verlag
    • (1998) Mobile Agents and Security , pp. 37-153
    • Vigna, G.1
  • 28
    • 18944393179 scopus 로고    scopus 로고
    • Encryption Tools for Mobile Agents: Sliding Encryption
    • E. Biham. Springer-Verlag
    • Young A., Yung M. Encryption Tools for Mobile Agents: Sliding Encryption. Biham E. Fast Software Encryption. 1997;Springer-Verlag
    • (1997) Fast Software Encryption
    • Young, A.1    Yung, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.