메뉴 건너뛰기




Volumn 3, Issue 4, 2007, Pages 267-283

TAMAP: A new trust-based approach for mobile agent protection

Author keywords

[No Author keywords available]

Indexed keywords

ADAPTIVE SYSTEMS; DATA ACQUISITION; QUALITY OF SERVICE; SOFTWARE ARCHITECTURE;

EID: 35348963026     PISSN: 17729890     EISSN: 17729904     Source Type: Journal    
DOI: 10.1007/s11416-007-0056-y     Document Type: Article
Times cited : (14)

References (55)
  • 3
    • 33947609379 scopus 로고    scopus 로고
    • On the possibility of practically obfuscating program-towards a unified perspective of code protection
    • WTCV'06 Special Issue, G. Boufante, I., Marion, J.Y. (eds)
    • Beaucamps, P., Filiol, E.: On the possibility of practically obfuscating program-towards a unified perspective of code protection. WTCV'06 Special Issue, G. Boufante, I., Marion, J.Y. (eds) J. Comput.Virol. 3(1) (2007)
    • (2007) J. Comput.Virol. , vol.3 , Issue.1
    • Beaucamps, P.1    Filiol, E.2
  • 4
    • 0012096118 scopus 로고    scopus 로고
    • Computing functions of a shared secret
    • 3
    • Beimel A. and Burmester M. (2000). Computing functions of a shared secret. SIAM J. Discrete Math. 13(3): 324-345
    • (2000) SIAM J. Discrete Math. , vol.13 , pp. 324-345
    • Beimel, A.1    Burmester, M.2
  • 6
    • 23944459002 scopus 로고    scopus 로고
    • Classification of malicious host threats in mobile agent computing
    • Bierman, E., Cloete, E.: Classification of malicious host threats in mobile agent computing. In: Proceedings of SACICSIT2002, pp. 141-148 (2002)
    • (2002) Proceedings of SACICSIT2002 , pp. 141-148
    • Bierman, E.1    Cloete, E.2
  • 8
    • 0012003998 scopus 로고    scopus 로고
    • Trust revelation in multiagent interaction
    • Workshop on the Philosophy and Design of Socially Adept Technologies, Minneapolis
    • Braynov, S., Sandhol, T.: Trust revelation in multiagent interaction. In: Proceedings of CHI'02, Workshop on the Philosophy and Design of Socially Adept Technologies, Minneapolis (2002)
    • (2002) Proceedings of CHI'02
    • Braynov, S.1    Sandhol, T.2
  • 9
    • 2442549069 scopus 로고    scopus 로고
    • Using trust for secure collaboration in uncertain environment
    • 3
    • Cahill V. (2003). Using trust for secure collaboration in uncertain environment. IEEE Pervasive Comput. 2(3): 52-61
    • (2003) IEEE Pervasive Comput. , vol.2 , pp. 52-61
    • Cahill, V.1
  • 13
    • 7044221923 scopus 로고    scopus 로고
    • A service-oriented trust management framework
    • Falcone, R., Barber, S., Korba, L., Singh, M. (eds) Trust, reputation, and security: theories and practice Springer, Heidelberg
    • Dimitrakos, T.: A service-oriented trust management framework. In: Falcone, R., Barber, S., Korba, L., Singh, M. (eds) Trust, reputation, and security: theories and practice, LNAI 2631. Springer, Heidelberg, pp. 53-72 (2003)
    • (2003) LNAI , vol.2631 , pp. 53-72
    • Dimitrakos, T.1
  • 15
    • 33746882722 scopus 로고    scopus 로고
    • Strong cryptography armoured computer viruses forbidding code analysis: The bradley virus
    • Filiol, E.: Strong cryptography armoured computer viruses forbidding code analysis: the bradley virus. In: Proceedings of the 14th EICAR Conference (2005)
    • (2005) Proceedings of the 14th EICAR Conference
    • Filiol, E.1
  • 17
    • 33748978409 scopus 로고    scopus 로고
    • Malware pattern scanning schemes secure against black-box analysis
    • EICAR 2006 Special Issue, Broucek I, V., Turnee, P. (eds)
    • Filiol, E.: Malware pattern scanning schemes secure against black-box analysis. EICAR 2006 Special Issue, Broucek I, V., Turnee, P. (eds) J. Comput. Virol. 2(1), (2006)
    • (2006) J. Comput. Virol. , vol.2 , Issue.1
    • Filiol, E.1
  • 19
    • 0009481412 scopus 로고    scopus 로고
    • A survey of trust in internet applications
    • Fourth Quarter
    • Grandison, T., Sloman, M.: A survey of trust in internet applications. IEEE Commun. Surv. Tutor., Fourth Quarter (2000)
    • (2000) IEEE Commun. Surv. Tutor.
    • Grandison, T.1    Sloman, M.2
  • 20
    • 0032203850 scopus 로고    scopus 로고
    • Secure java class loading
    • Gong, L.: Secure java class loading. IEEE Internet Comput. 56-61 (1998)
    • (1998) IEEE Internet Comput. , pp. 56-61
    • Gong, L.1
  • 21
    • 4544372344 scopus 로고    scopus 로고
    • Monitoring and organizational-level adaptation of multi-agent systems
    • ACM, New York
    • Guessoum, Z., Ziane, M., Faci, N.: Monitoring and organizational-level adaptation of multi-agent systems. In: AAMAS'04. ACM, New York, pp. 514-522 (2004)
    • (2004) AAMAS'04 , pp. 514-522
    • Guessoum, Z.1    Ziane, M.2    Faci, N.3
  • 22
    • 35348958221 scopus 로고    scopus 로고
    • Using a trust-based key to protect mobile agent code
    • ISSN 1305-5313, World Enformatika Society, CCIS'2006, Venice, Italy
    • Hacini, S., Guessoum, Z., Boufaida, Z: Using a trust-based key to protect mobile agent code. In: Transactions on Engineering, Computing and Technology, vol. 16, ISSN 1305-5313, World Enformatika Society, CCIS'2006, Venice, Italy, pp. 326-332 (2006)
    • (2006) Transactions on Engineering, Computing and Technology , vol.16 , pp. 326-332
    • Hacini, S.1    Guessoum, Z.2    Boufaida, Z.3
  • 25
    • 0001943763 scopus 로고    scopus 로고
    • Time limited blackbox security: Protecting mobile agents from malicious hosts
    • Vigna, G. (ed) Mobile agents and security Springer, Heidelberg
    • Hohl, F.: Time limited blackbox security: protecting mobile agents from malicious hosts. In: Vigna, G. (ed) Mobile agents and security. Lecture Notes in Computer Science, Vol. 1419, pp. 52-59. Springer, Heidelberg (1998)
    • (1998) Lecture Notes in Computer Science , vol.1419 , pp. 52-59
    • Hohl, F.1
  • 26
    • 0003954474 scopus 로고    scopus 로고
    • NIST Special Publication 800-19, National Institute of Standard and Technology
    • Jansen, W., Karygiannis, T.: Mobile agent security. NIST Special Publication 800-19, National Institute of Standard and Technology (2000)
    • (2000) Mobile Agent Security
    • Jansen, W.1    Karygiannis, T.2
  • 27
    • 0242719010 scopus 로고    scopus 로고
    • Trust-based decision making for electronic transactions
    • Stockholm University Report 99-005, Stockholm
    • Josang, A.: Trust-based decision making for electronic transactions. In: The fourth Nordic Workshop on Secure ITSystems (NORDSEC'99), Stockholm University Report 99-005, Stockholm (1999)
    • (1999) The Fourth Nordic Workshop on Secure ITSystems (NORDSEC'99)
    • Josang, A.1
  • 30
    • 0003802916 scopus 로고    scopus 로고
    • PhD thesis, Department of Computer Sciences and Engineering, University of Minnesota, Minneapolis, USA
    • Karnik, N.: Security in mobile agents systems. PhD thesis, Department of Computer Sciences and Engineering, University of Minnesota, Minneapolis, USA (1998)
    • (1998) Security in Mobile Agents Systems
    • Karnik, N.1
  • 32
    • 0242340728 scopus 로고    scopus 로고
    • Modelling and evaluating trust relationships in mobile agent based systems
    • Proceedings of First International Conference on Applied Cryptography and Network Security (ACNS03) Springer, Kunming
    • Lin, C., Varadharajan V.: Modelling and evaluating trust relationships in mobile agent based systems. In: Proceedings of First International Conference on Applied Cryptography and Network Security (ACNS03), Lecture Notes in Computer Science, Vol. 2846, pp. 176-190. Springer, Kunming (2003)
    • (2003) Lecture Notes in Computer Science , vol.2846 , pp. 176-190
    • Lin, C.1    Varadharajan, V.2
  • 33
    • 35048873712 scopus 로고    scopus 로고
    • On the design of a new trust model for mobile agent security
    • The 1st International Conference on Trust and Privacy in Digital Business (TrustBus04) Springer, Zaragoza
    • Lin, C., Varadharajan V., Wang Y., Mu Y.: On the design of a new trust model for mobile agent security. In: The 1st International Conference on Trust and Privacy in Digital Business (TrustBus04), Lecture Notes in Computer Science, Vol. 3184, pp. 60-69. Springer, Zaragoza (2004)
    • (2004) Lecture Notes in Computer Science , vol.3184 , pp. 60-69
    • Lin, C.1    Varadharajan, V.2    Wang, Y.3    Mu, Y.4
  • 36
    • 0033893895 scopus 로고    scopus 로고
    • E-commerce trust metrics and models
    • Manchala, D.W.: E-commerce trust metrics and models. IEEE Internet Comput. 36-44 (2000)
    • (2000) IEEE Internet Comput. , pp. 36-44
    • Manchala, D.W.1
  • 37
    • 35048873712 scopus 로고    scopus 로고
    • On the design of a new trust model for mobile agent security, trust and privacy in digital business
    • Springer, Berlin
    • Mu, Y., Lin, C., Varadharajan, V., Wang, Y.: On the design of a new trust model for mobile agent security, trust and privacy in digital business. Lecture Notes in Computer Science, Vol. 3184, pp. 60-69. Springer, Berlin (2004)
    • (2004) Lecture Notes in Computer Science , vol.3184 , pp. 60-69
    • Mu, Y.1    Lin, C.2    Varadharajan, V.3    Wang, Y.4
  • 41
    • 0003249402 scopus 로고    scopus 로고
    • Environment key generation towards clueless agents
    • Riordan J. and Schneier B. (1998). Environment key generation towards clueless agents. Lect. Notes Comput. Sci. 1419: 15-24
    • (1998) Lect. Notes Comput. Sci. , vol.1419 , pp. 15-24
    • Riordan, J.1    Schneier, B.2
  • 46
    • 0031681561 scopus 로고    scopus 로고
    • Toward mobile cryptography
    • IEEE Computer Soc. Press, Los Alamitos
    • Sander, T., Tschudin, C.: Toward mobile cryptography. IEEE Symposium Security and Privacy, IEEE Computer Soc. Press, Los Alamitos, pp. 215-224 (1998)
    • (1998) IEEE Symposium Security and Privacy , pp. 215-224
    • Sander, T.1    Tschudin, C.2
  • 49
    • 84948187986 scopus 로고    scopus 로고
    • Trust relationships in a mobile agent system
    • Picco, G.P. (ed) Fifth IEEE International Conference on Mobile Agents Springer, Atlanta
    • Tan, H.K., Moreau, L.: Trust relationships in a mobile agent system. In: Picco, G.P. (ed) Fifth IEEE International Conference on Mobile Agents, Lecture Notes in Computer Science, vol. 2240. Springer, Atlanta (2001)
    • (2001) Lecture Notes in Computer Science , vol.2240
    • Tan, H.K.1    Moreau, L.2
  • 51
    • 0037083318 scopus 로고    scopus 로고
    • Integrity protection for Code-On-Demand Mobile Agents in E-Commerce
    • Wang T., Guan S. and Khoon Chan T. (2000). Integrity protection for Code-On-Demand Mobile Agents in E-Commerce. J. Syst. Softw. 60: 211-221
    • (2000) J. Syst. Softw. , vol.60 , pp. 211-221
    • Wang, T.1    Guan, S.2    Khoon Chan, T.3
  • 52
    • 0034272456 scopus 로고    scopus 로고
    • A pessimistic approach to trust in mobile agent platforms
    • ISSN: 1089-7801
    • Wilhelm, U.G., Staamann, S.M., Buttyan, L.: A pessimistic approach to trust in mobile agent platforms. IEEE Internet Comput. 45, ISSN: 1089-7801, pp. 40-48 (2000)
    • (2000) IEEE Internet Comput. , vol.45 , pp. 40-48
    • Wilhelm, U.G.1    Staamann, S.M.2    Buttyan, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.