-
1
-
-
85013566936
-
-
Allée G, Pierre S, Glitho RH, El Rhazi A. An improved itinerary recording protocol for securing distributed architectures based on mobile agents, Int J Mobile Inform Systems, 2005; 1(2): 127-49.
-
-
-
-
2
-
-
34047151615
-
-
Bäumer C, Breugst M, Choy S, Magedanz T. Grasshopper-a universal agent platform based on OMG MASIF and FIPA standards. First International Workshop on Mobile Agents for Telecommunication Applications (MATA'99), Ottawa, Canada. USA: World Scientific Publishing; October 1999. p. 1-8.
-
-
-
-
3
-
-
0141651851
-
-
El Rhazi A, Pierre S, Boucheneb H. Secure protocol in mobile agent environments. IEEE CCECE 2003, May 4-7, vol. 2, Montreal, pp.777-80.
-
-
-
-
4
-
-
34047178206
-
-
Farmer WM, Guttman JD, Swarup V. Security for mobile agents: issues and requirements. In: Proceedings of the 19th National Information Systems Security Conference, October 1996. p. 591-7.
-
-
-
-
5
-
-
34047157979
-
-
Hohl F. Time limited blackbox security: protection mobile agent from malicious hosts. Mobile agents and security, Lecture Notes in Computer Science, No. 1419. Berlin: Springer; 1998. p. 92-113.
-
-
-
-
6
-
-
0033706501
-
-
Hohl F. A framework to protect mobile agents by using reference states. In: Los Alamitos, editor. Proceedings of the 20th international conference on distributed computing systems, California: IEEE Computer Society; 2000. p. 410-7.
-
-
-
-
7
-
-
34047129494
-
-
IKV++, Grasshopper Basics And Concepts, Berlin Germany 1998. online documentation: http://www.grasshopper.de/download/doc/GrasshopperAndStandards.pdf
-
-
-
-
8
-
-
34047152612
-
-
Institute for Applied Information, The IAIK Java Cryptography Extension (IAIK-JCE) 3.03. In: Processing and Communication of the Technical University Graz, 2002. online documentation:http://jce.iaik.tugraz.at/products/01_jce/documentation/ja vadoc/
-
-
-
-
9
-
-
34047157428
-
-
Jansen WA, Karygiannis T. Mobile agent security. In: NIST Special Publication 800-19, National Institute of Standards and Technology, August 1999.
-
-
-
-
10
-
-
0034315517
-
-
Jansen WA. Countermeasures for mobile agent security. Computer communications, special issue on advanced security techniques for network protection. Amsterdam: Elsevier; November 2000.
-
-
-
-
11
-
-
0033702826
-
-
Karnik NM, Tripathi AR. A security architecture for mobile agents in Ajanta. In: Los Alamitos, editor. Proceedings of the 20th international conference on distributed computing systems. California: IEEE Computer Society; 2000. p. 402-9.
-
-
-
-
12
-
-
85015667755
-
-
Minsky Y, Van Renesse R, Scheinder F, Stoller S. Cryptographic support for fault-tolerant distributed computing. In: Proceeding of the 17th ACM SIGOPS, European Workshop, 1996. p. 109-14.
-
-
-
-
13
-
-
34047162736
-
-
Poslad SJ, Bourne RA, Hayzelden ALG, Buckle P. Agent technology for communication infrastructure: an introduction. In: Wiley, editor. Agent technology for communication Infrastructure, 2001. p. 5-15.
-
-
-
-
14
-
-
34047140206
-
-
Roth V. Mutual Protection of co-operating agents. In: Vitek, Jensen, editors. Secure internet programming. Berlin: Verlag; 1998. p. 26-37.
-
-
-
-
15
-
-
34047154853
-
-
Sander T, Tschudin CF. Protecting mobile agents against malicious hosts. In: Vigna G, editor. Mobile agents and security, Lectur Notes in Computer Science, No. 1419. Berlin: Springer; 1998. p. 44-60.
-
-
-
-
16
-
-
34047152087
-
-
Schnoebelen P, Laroussinie F, Bidoit M, Bérard B, Petit A. Systems and software verification: model-checking techniques and tools. Berlin: Springer, 2001. p. XIII-V.
-
-
-
-
17
-
-
34047172350
-
-
Vigna G. Cryptographic traces for mobile agents. In: Vigna G, editor. Mobile agents and security, Lectur Notes in Computer Science, No. 1419. Berlin: Springer; 1998. p. 137-53.
-
-
-
|