-
2
-
-
18944405450
-
Terraforming cyberspace: Toward a policy-based grid infrastructure for secure, scalable, and robust execution of Java-based multi-agent systems
-
May Montreal Canada
-
Bradshaw, J. M., Suri N., Kahn M., Sage P., Weishar D. and Jeffers, R. Terraforming cyberspace: Toward a policy-based grid infrastructure for secure, scalable, and robust execution of Java-based multi-agent systems. Proceedings of the Autonomous Agents 2001 Workshop on Scalable Agent Infrastructure, May 2001, Montreal Canada.
-
(2001)
Proceedings of the Autonomous Agents 2001 Workshop on Scalable Agent Infrastructure
-
-
Bradshaw, J.M.1
Suri, N.2
Kahn, M.3
Sage, P.4
Weishar, D.5
Jeffers, R.6
-
7
-
-
18944390720
-
A framework to protect mobile agents by using reference states
-
Universitt Stuttgart
-
Hohl, F. A Framework to Protect Mobile Agents by Using Reference States. Technical Report Nr. 2000/03, Universitt Stuttgart, 2000.
-
(2000)
Technical Report Nr. 2000/03
, vol.2000
, Issue.3
-
-
Hohl, F.1
-
8
-
-
0001943763
-
Time limited blackbox security: Protecting mobile agents from malicious hosts
-
G. Vigna. Springer-Verlag
-
Hohl F. Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts. Vigna G. Mobile Agents and Security. 1998;Springer-Verlag
-
(1998)
Mobile Agents and Security
-
-
Hohl, F.1
-
10
-
-
0000709927
-
-
Rothermel, Popescu-Zeletin
-
Karjoth G., Asokan N., and Guelcue, C. Protecting the computation results of Free-roaming agents. Rothermel, Popescu-Zeletin, pages 1-14, 1998.
-
(1998)
Protecting the Computation Results of Free-roaming Agents
, pp. 1-14
-
-
Karjoth, G.1
Asokan, N.2
Guelcue, C.3
-
11
-
-
84958968002
-
Secure transactions with mobile agents in hostile environments
-
Dawson, E., Clark, A., and Boyd, C. Information Security and Privacy Springer-Verlag
-
Kotzanikolaou, P., Burmester M., and Chrissikopoulos, V. Secure Transactions with Mobile Agents in Hostile Environments. In Dawson, E., Clark, A., and Boyd, C. Information Security and Privacy. LNCS Vol. 1841, Springer-Verlag, pages 289-297, 2000
-
(2000)
LNCS
, vol.1841
, pp. 289-297
-
-
Kotzanikolaou, P.1
Burmester, M.2
Chrissikopoulos, V.3
-
16
-
-
0032028340
-
Scripting: Higher-Level Programming for the 21st Century
-
Ousterhout J.K. Scripting: Higher-Level Programming for the 21st Century. IEEE Computer. 1998;23-30
-
(1998)
IEEE Computer
, pp. 23-30
-
-
Ousterhout, J.K.1
-
17
-
-
0003249402
-
Environmental Key Generation Towards Clueless Agents
-
G. Vigna. Springer-Verlag
-
Riordan J., Schneier B. Environmental Key Generation Towards Clueless Agents. Vigna G. Mobile Agents and Security. 1998;Springer-Verlag
-
(1998)
Mobile Agents and Security
-
-
Riordan, J.1
Schneier, B.2
-
18
-
-
0003197918
-
Protecting Mobile Agents Against Malicious Hosts
-
G. Vigna. Springer-Verlag
-
Sander T., Tschudin C.F. Protecting Mobile Agents Against Malicious Hosts. Vigna G. Mobile Agents and Security. 1997;Springer-Verlag
-
(1997)
Mobile Agents and Security
-
-
Sander, T.1
Tschudin, C.F.2
-
19
-
-
84867375050
-
-
Suri N. Bradshaw, J.M., Breedy, M.R., Ford, K.M., Groth, P.T., Hill, G.A., Saavedra, R. State Capture and Resource Control for Java: The Design and Implementation of the Aroma Virtual Machine. Available on-line at http://nomads.coginst.uwf.edu/.
-
State Capture and Resource Control for Java: The Design and Implementation of the Aroma Virtual Machine
-
-
Suri Bradshaw, N.J.M.1
Breedy, M.R.2
Ford, K.M.3
Groth, P.T.4
Hill, G.A.5
Saavedra, R.6
-
20
-
-
18944406912
-
-
Sixth ECOOP Workshop on Mobile Object Systems
-
Suri N., Bradshaw, J.M., Breedy, M.R., Groth, P.T., Hill, G.A., and Jeffers R., and Mitrovich T.S. An Overview of the NOMADS Mobile Agent System. Sixth ECOOP Workshop on Mobile Object Systems.
-
An Overview of the NOMADS Mobile Agent System
-
-
Suri, N.1
Bradshaw, J.M.2
Breedy, M.R.3
Groth, P.T.4
Hill, G.A.5
Jeffers, R.6
Mitrovich, T.S.7
-
21
-
-
0001797226
-
Strong mobility and fine-grained resource control in NOMADS
-
Springer-Verlag
-
Suri N., Bradshaw, J.M., Breedy, M.R., Groth, P.T., Hill, G.A., and Jeffers, R. Strong Mobility and Fine-Grained Resource Control in NOMADS. Proceedings of the 2nd International Symposium on Agents Systems and Applications and the 4th International Symposium on Mobile Agents (ASA/MA 2000). Springer-Verlag.
-
Proceedings of the 2nd International Symposium on Agents Systems and Applications and the 4th International Symposium on Mobile Agents (ASA/MA 2000)
-
-
Suri, N.1
Bradshaw, J.M.2
Breedy, M.R.3
Groth, P.T.4
Hill, G.A.5
Jeffers, R.6
-
23
-
-
0002717089
-
Cryptographic Traces for Mobile Agents
-
G. Vigna. Springer-Verlag
-
Vigna G. Cryptographic Traces for Mobile Agents. Vigna G. Mobile Agents and Security. 1998;37-153 Springer-Verlag
-
(1998)
Mobile Agents and Security
, pp. 37-153
-
-
Vigna, G.1
-
25
-
-
84944079038
-
Protecting a mobile agent's route against collusions
-
Westhoff D., Schneider M., Unger C., and Kaderali, F. Protecting a Mobile Agent's Route against Collusions. Springer LNCS 1758, 1999.
-
(1999)
Springer LNCS
, vol.1758
-
-
Westhoff, D.1
Schneider, M.2
Unger, C.3
Kaderali, F.4
-
28
-
-
18944393179
-
Encryption Tools for Mobile Agents: Sliding Encryption
-
E. Biham. Springer-Verlag
-
Young A., Yung M. Encryption Tools for Mobile Agents: Sliding Encryption. Biham E. Fast Software Encryption. 1997;Springer-Verlag
-
(1997)
Fast Software Encryption
-
-
Young, A.1
Yung, M.2
|