-
4
-
-
0030615467
-
Designing distributed applications with mobile code paradigms
-
R.Taylor, editor, pages ACM Press
-
A. Carzaniga, G. P. Picco, and G. Vigna. Designing distributed applications with mobile code paradigms. In R.Taylor, editor, Proceedings of the 19th International Conference on Software Engineering (ICSE'97), pages 22-32. ACM Press, 1997.
-
(1997)
Proceedings of the 19th International Conference on Software Engineering (ICSE'97)
, pp. 22-32
-
-
Carzaniga, A.1
Picco, G. P.2
Vigna, G.3
-
6
-
-
0029392001
-
Itinerant agents for mobile computing
-
October
-
D. M. Chess, B. Grosof, C. G. Harrison, D. Levine, C. Parris, and G. Tsudik. Itinerant agents for mobile computing. IEEE Personal Communications, 2(3):34-49, October 1995.
-
(1995)
IEEE Personal Communications
, vol.2
, Issue.3
, pp. 34-49
-
-
Chess, D. M.1
Grosof, B.2
Harrison, C. G.3
Levine, D.4
Parris, C.5
Tsudik, G.6
-
8
-
-
0003969633
-
-
DoD. Technical Report DoD 5200.28-STD, Department of Defense, December
-
DoD. Trusted Computer System Evaluation Criteria (TCSEC). Technical Report DoD 5200.28-STD, Department of Defense, December 1985.
-
(1985)
Trusted Computer System Evaluation Criteria (TCSEC)
-
-
-
9
-
-
0029405909
-
The TINA Consortium: Toward networking telecommunications information services
-
November
-
F. Dupuy, G. Nilsson, and Y. Inoue. The TINA Consortium: Toward networking telecommunications information services. IEEE Communications Magazine, November 1995.
-
(1995)
IEEE Communications Magazine
-
-
Dupuy, F.1
Nilsson, G.2
Inoue, Y.3
-
14
-
-
84955594169
-
Mobile agents: Are they a good idea?
-
J. Vitek and C. Tschudin, editors, pages Springer, Also available as IBM Technical Report RC 19887
-
C. G. Harrison, D. M. Chess, and A. Kershen-baum. Mobile agents: Are they a good idea? In J. Vitek and C. Tschudin, editors, Mobile Object Systems: Towards the Programmable Internet, volume 1222 of Lecture Notes on Computer Science, pages 25-47. Springer, 1997. Also available as IBM Technical Report RC 19887.
-
(1997)
Mobile Object Systems: Towards the Programmable Internet, volume 1222 of Lecture Notes on Computer Science
, pp. 25-47
-
-
Harrison, C. G.1
Chess, D. M.2
Kershen-baum, A.3
-
15
-
-
35349021861
-
Public protection of software
-
Santa Barbara, California, August
-
A. Herzberg and S. S. Pinter. Public protection of software. In Advances in Cryptology: CRYPTO'85, pages 158-179, Santa Barbara, California, August 1985.
-
(1985)
Advances in Cryptology: CRYPTO'85
, pp. 158-179
-
-
Herzberg, A.1
Pinter, S. S.2
-
17
-
-
0041745478
-
Signing and marking ActiveX controls
-
November
-
P. Johns. Signing and marking ActiveX controls. Developer Network News, November 1996.
-
(1996)
Developer Network News
-
-
Johns, P.1
-
19
-
-
0041915631
-
-
RSA Data Security, Inc., November
-
RSA Data Security, Inc. PKCS #1: RSA Encryption Standard. RSA Data Security, Inc., November 1993.
-
(1993)
PKCS #1: RSA Encryption Standard
-
-
-
20
-
-
85030463467
-
A formal approach to security architectures
-
Brighton, England
-
R. A. Rueppel. A formal approach to security architectures. In EuroCrypt, pages 387-398, Brighton, England, 1991.
-
(1991)
EuroCrypt
, pp. 387-398
-
-
Rueppel, R. A.1
-
22
-
-
0001636850
-
Ker-beros: An authentication service for open network systems
-
USENIX Association, Berkeley, USA, February
-
J. G. Steiner, C. Neuman, and J. I. Schiller. Ker-beros: An authentication service for open network systems. In Proceedings of the USENIX Winter 1988 Technical Conference, pages 191-202. USENIX Association, Berkeley, USA, February 1988.
-
(1988)
Proceedings of the USENIX Winter 1988 Technical Conference
, pp. 191-202
-
-
Steiner, J. G.1
Neuman, C.2
Schiller, J. I.3
-
25
-
-
0030405434
-
The non-technical threat to computing systems
-
Winter
-
I. S. Winkler. The non-technical threat to computing systems. Computing Systems, USENIX Association, 9(1):3-14, Winter 1996.
-
(1996)
Computing Systems, USENIX Association
, vol.9
, Issue.1
, pp. 3-14
-
-
Winkler, I. S.1
-
26
-
-
0026630927
-
Authentication for distributed systems
-
January
-
T. Y. C. Woo and S. S. Lam. Authentication for distributed systems. IEEE Computer, 25(1):39-52, January 1992.
-
(1992)
IEEE Computer
, vol.25
, Issue.1
, pp. 39-52
-
-
Woo, T. Y. C.1
Lam, S. S.2
|