메뉴 건너뛰기




Volumn 1, Issue , 2007, Pages 486-492

Mobile agents and the deus ex machina

Author keywords

[No Author keywords available]

Indexed keywords

MOBILE COMPUTING; SECURITY OF DATA; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 35248861213     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/AINAW.2007.252     Document Type: Conference Paper
Times cited : (14)

References (16)
  • 1
    • 35248895553 scopus 로고    scopus 로고
    • Privacy preserving trust agents
    • Technical Report HPL-2004-197, HP Labs, Bristol, UK, 11 November
    • S. Crane. Privacy preserving trust agents. Technical Report HPL-2004-197, HP Labs, Bristol, UK, 11 November 2004.
    • (2004)
    • Crane, S.1
  • 2
    • 35248861379 scopus 로고    scopus 로고
    • L. D'Anna, B. Matt, A. Reisse, T. Van Vleck, 5. Schwab, and P. LeBlanc. Self-protecting mobile agents obfuscation report. Technical Report Report 03-015, Network Associates Laboratories, 2003.
    • L. D'Anna, B. Matt, A. Reisse, T. Van Vleck, 5. Schwab, and P. LeBlanc. Self-protecting mobile agents obfuscation report. Technical Report Report 03-015, Network Associates Laboratories, 2003.
  • 4
    • 35248842207 scopus 로고    scopus 로고
    • E. Gallery and A. Tomlinson. Protection of downloadable software on SDR devices. In Proceedings of the 4th Software Defined Radio Forum Technical Conference (SDR 2005), Orange County, California, USA, 14-18 November 2005. Software Defined Radio Forum (SDRF).
    • E. Gallery and A. Tomlinson. Protection of downloadable software on SDR devices. In Proceedings of the 4th Software Defined Radio Forum Technical Conference (SDR 2005), Orange County, California, USA, 14-18 November 2005. Software Defined Radio Forum (SDRF).
  • 5
    • 0003954474 scopus 로고    scopus 로고
    • NIST Special Publication 800-19, National Institute of Standards and Technology NIST, Computer Security Division, Gaithersburg, Maryland, USA
    • W. Jansen and T. Karygiannis. Mobile agents and security. NIST Special Publication 800-19, National Institute of Standards and Technology (NIST), Computer Security Division, Gaithersburg, Maryland, USA, 1999.
    • (1999) Mobile agents and security
    • Jansen, W.1    Karygiannis, T.2
  • 6
    • 35348989745 scopus 로고    scopus 로고
    • Trusted Computing
    • C. Mitchell, editor, The Institute of Electrical Engineers IEE, London, UK, April
    • C. Mitchell, editor. Trusted Computing. IEE Professional Applications of Computing Series 6. The Institute of Electrical Engineers (IEE), London, UK, April 2005.
    • (2005) IEE Professional Applications of Computing Series , vol.6
  • 7
    • 2442419307 scopus 로고    scopus 로고
    • Trusted agents that enhance user privacy by self- profiling
    • Technical Report HPL-2002-196, HP Labs, Bristol, UK, 15 July
    • S. Pearson. Trusted agents that enhance user privacy by self- profiling. Technical Report HPL-2002-196, HP Labs, Bristol, UK, 15 July 2002.
    • (2002)
    • Pearson, S.1
  • 8
    • 84890042993 scopus 로고    scopus 로고
    • S. Pearson. How trusted computers can enhance for privacy preserving mobile applications. In Proceedings of the 1st International IEEE WoWMoM Workshop on Trust, Security and Privacy for Ubiquitous Computing (WOWMOM '05), pages 609-613, Taormina, Sicily, Italy, 13-16 June 2005. IEEE Computer Society, Washington, DC, USA.
    • S. Pearson. How trusted computers can enhance for privacy preserving mobile applications. In Proceedings of the 1st International IEEE WoWMoM Workshop on Trust, Security and Privacy for Ubiquitous Computing (WOWMOM '05), pages 609-613, Taormina, Sicily, Italy, 13-16 June 2005. IEEE Computer Society, Washington, DC, USA.
  • 10
    • 0003249402 scopus 로고    scopus 로고
    • Environmental key generation towards clueless agents
    • G. Vigna, editor, Mobile Agents and Security, of, Springer-Verlag, Berlin-Heidelberg, Germany
    • J. Riordan and Bruce Schneier. Environmental key generation towards clueless agents. In G. Vigna, editor, Mobile Agents and Security, volume 1419 of Lecture Notes in Comptuer Science (LNCS), pages 15-24. Springer-Verlag, Berlin-Heidelberg, Germany, 1998.
    • (1998) Lecture Notes in Comptuer Science , vol.1419 , pp. 15-24
    • Riordan, J.1    Schneier, B.2
  • 11
    • 84947912805 scopus 로고    scopus 로고
    • Secure recording of itineraries through co-operating agents
    • 20-24 July
    • V. Roth. Secure recording of itineraries through co-operating agents. In Workshop ion on ObjectOriented Technology (ECOOP '98), pages 297-298, 20-24 July 1998.
    • (1998) Workshop ion on ObjectOriented Technology (ECOOP '98) , pp. 297-298
    • Roth, V.1
  • 12
    • 0442286133 scopus 로고    scopus 로고
    • Mobile agents
    • A. Kent and J.G. Williams, editors, M. Dekker Inc, New York, USA
    • K. Rothermel and M. Schwehm. Mobile agents. In A. Kent and J.G. Williams, editors, Encyclopedia for Computer Science and Technology, volume 40, pages 155-176. M. Dekker Inc., New York, USA, 1999.
    • (1999) Encyclopedia for Computer Science and Technology , vol.40 , pp. 155-176
    • Rothermel, K.1    Schwehm, M.2
  • 13
    • 35248819427 scopus 로고    scopus 로고
    • TCG Specification Architecture Overview
    • TCG, Version 1.2, The Trusted Computing Group TCG, Portland, Oregon, USA, April
    • TCG. TCG Specification Architecture Overview. TCG Specification Version 1.2, The Trusted Computing Group (TCG), Portland, Oregon, USA, April 2003.
    • (2003) TCG Specification
  • 14
    • 0002717089 scopus 로고    scopus 로고
    • Cryptographic traces for mobile agents
    • G. Vigna, editor, Mobile Agents and Security, of, Springer-Verlag, Berlin-Heidelberg, Germany
    • G. Vigna. Cryptographic traces for mobile agents. In G. Vigna, editor, Mobile Agents and Security, volume 1419 of Lecture Notes in Computer Science, pages 137-153. Springer-Verlag, Berlin-Heidelberg, Germany, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1419 , pp. 137-153
    • Vigna, G.1
  • 16
    • 84982994321 scopus 로고    scopus 로고
    • Introducing trusted third parties to the mobile agent paradigm
    • J. Vitek and C. Jensen, editors, Secure Internet Programming: Security Issues for Mobile and Distributed Objects, Springer-Verlag, London, UK
    • U.G. Wilhelm, S. Staamann, and L. Butty. Introducing trusted third parties to the mobile agent paradigm. In J. Vitek and C. Jensen, editors, Secure Internet Programming: Security Issues for Mobile and Distributed Objects, volume Lecture Notes In Computer Science, pages 469-489. Springer-Verlag, London, UK, 1999.
    • (1999) Lecture Notes In Computer Science , pp. 469-489
    • Wilhelm, U.G.1    Staamann, S.2    Butty, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.