메뉴 건너뛰기




Volumn , Issue , 1998, Pages

On the Problem of Trust in Mobile Agent Systems

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK SECURITY; OPEN SYSTEMS;

EID: 26844544709     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (50)

References (28)
  • 8
    • 0003969633 scopus 로고
    • DoD. Technical Report DoD 5200.28-STD, Department of Defense, December
    • DoD. Trusted Computer System Evaluation Criteria (TCSEC). Technical Report DoD 5200.28-STD, Department of Defense, December 1985.
    • (1985) Trusted Computer System Evaluation Criteria (TCSEC)
  • 9
    • 0029405909 scopus 로고
    • The TINA Consortium: Toward networking telecommunications information services
    • November
    • F. Dupuy, G. Nilsson, and Y. Inoue. The TINA Consortium: Toward networking telecommunications information services. IEEE Communications Magazine, November 1995.
    • (1995) IEEE Communications Magazine
    • Dupuy, F.1    Nilsson, G.2    Inoue, Y.3
  • 15
    • 35349021861 scopus 로고
    • Public protection of software
    • Santa Barbara, California, August
    • A. Herzberg and S. S. Pinter. Public protection of software. In Advances in Cryptology: CRYPTO'85, pages 158-179, Santa Barbara, California, August 1985.
    • (1985) Advances in Cryptology: CRYPTO'85 , pp. 158-179
    • Herzberg, A.1    Pinter, S. S.2
  • 17
    • 0041745478 scopus 로고    scopus 로고
    • Signing and marking ActiveX controls
    • November
    • P. Johns. Signing and marking ActiveX controls. Developer Network News, November 1996.
    • (1996) Developer Network News
    • Johns, P.1
  • 19
    • 0041915631 scopus 로고
    • RSA Data Security, Inc., November
    • RSA Data Security, Inc. PKCS #1: RSA Encryption Standard. RSA Data Security, Inc., November 1993.
    • (1993) PKCS #1: RSA Encryption Standard
  • 20
    • 85030463467 scopus 로고
    • A formal approach to security architectures
    • Brighton, England
    • R. A. Rueppel. A formal approach to security architectures. In EuroCrypt, pages 387-398, Brighton, England, 1991.
    • (1991) EuroCrypt , pp. 387-398
    • Rueppel, R. A.1
  • 25
    • 0030405434 scopus 로고    scopus 로고
    • The non-technical threat to computing systems
    • Winter
    • I. S. Winkler. The non-technical threat to computing systems. Computing Systems, USENIX Association, 9(1):3-14, Winter 1996.
    • (1996) Computing Systems, USENIX Association , vol.9 , Issue.1 , pp. 3-14
    • Winkler, I. S.1
  • 26
    • 0026630927 scopus 로고
    • Authentication for distributed systems
    • January
    • T. Y. C. Woo and S. S. Lam. Authentication for distributed systems. IEEE Computer, 25(1):39-52, January 1992.
    • (1992) IEEE Computer , vol.25 , Issue.1 , pp. 39-52
    • Woo, T. Y. C.1    Lam, S. S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.