-
1
-
-
0000368626
-
Mole: Concepts of a mobile agent system
-
July-September
-
J. Baumann, F. Hohl, K. Rothermal, and M. Fraser, "Mole: Concepts of a mobile agent system," World Wide Web 1(3), July-September 1998, 123-137.
-
(1998)
World Wide Web
, vol.1
, Issue.3
, pp. 123-137
-
-
Baumann, J.1
Hohl, F.2
Rothermal, K.3
Fraser, M.4
-
2
-
-
0001636051
-
Authentication for mobile agents
-
Lecture Notes in Computer Science
-
S. Berkovits, J. Guttman, and V. Swarup, "Authentication for Mobile Agents," in Mobile Agents and Security, Lecture Notes in Computer Science, Vol. 1419, 1998.
-
(1998)
Mobile Agents and Security
, vol.1419
-
-
Berkovits, S.1
Guttman, J.2
Swarup, V.3
-
3
-
-
84982993891
-
Abstractions of mobile computations
-
Lecture Notes in Computer Science
-
L. Cardelli, "Abstractions of mobile computations," in Secure Internet Programming, Lecture Notes in Computer Science, Vol. 1603, 1999.
-
(1999)
Secure Internet Programming
, vol.1603
-
-
Cardelli, L.1
-
4
-
-
0002380598
-
Security issues in mobile code systems
-
Lecture Notes in Computer Science
-
D. Chess, "Security issues in mobile code systems," in Mobile Agents and Security, Lecture Notes in Computer Science, Vol. 1419, 1998.
-
(1998)
Mobile Agents and Security
, vol.1419
-
-
Chess, D.1
-
5
-
-
0004004188
-
Itinerant agents for mobile computing
-
D. Chess et al., "Itinerant agents for mobile computing," IBM Research Report RC20010, 1995.
-
(1995)
IBM Research Report
, vol.RC20010
-
-
Chess, D.1
-
6
-
-
84955565479
-
A calculus of mobile agents
-
C. Fournet, G. Gonthier, J. J. Levy, L. Maranget, and D. Remy, "A calculus of mobile agents," in Proceedings of the 7th International Conference on Concurrency Theory (CONCUR'96), 1996, pp. 406-421.
-
(1996)
Proceedings of the 7th International Conference on Concurrency Theory (CONCUR'96)
, pp. 406-421
-
-
Fournet, C.1
Gonthier, G.2
Levy, J.J.3
Maranget, L.4
Remy, D.5
-
7
-
-
4544373958
-
Understanding code mobility
-
May
-
A. Fuggetta, G. P. Picco, and G. Vigna, "Understanding code mobility," IEEE Transactions on Software Engineering 24(5), May 1998.
-
(1998)
IEEE Transactions on Software Engineering
, vol.24
, Issue.5
-
-
Fuggetta, A.1
Picco, G.P.2
Vigna, G.3
-
8
-
-
0002992633
-
D'Agents: Security in a multiple language mobile agent system
-
G. Vigna, Ed., Springer-Verlag
-
R. S. Gray, D. Kotx, G. Cybenko, and D. Rus, "D'Agents: Security in a multiple language mobile agent system," in Mobile Agents and Security, G. Vigna, Ed., Springer-Verlag, 1998, pp. 154-187.
-
(1998)
Mobile Agents and Security
, pp. 154-187
-
-
Gray, R.S.1
Kotx, D.2
Cybenko, G.3
Rus, D.4
-
9
-
-
0033724294
-
Access control meets public key infrastructure, or Assigning roles to strangers
-
A. Herzberg, Y. Mass, and J. Michaeli, "Access control meets public key infrastructure, or Assigning roles to strangers," Proceedings of the IEEE Symposium on Security and Privacy, 2000.
-
(2000)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Herzberg, A.1
Mass, Y.2
Michaeli, J.3
-
11
-
-
0001619596
-
Flexible support for multiple access policies
-
S. Jajodia, P. Samarti, M. Sapino and V. Subrahmanian, "Flexible support for multiple access policies," ACM Transactions on Database Systems 26(2), 2001, 214-260.
-
(2001)
ACM Transactions on Database Systems
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarti, P.2
Sapino, M.3
Subrahmanian, V.4
-
12
-
-
0042849357
-
-
PhD Thesis, Department of Computer Science, University of Minnesota
-
N. Karnik, "Security in Ajanta mobile agent system," PhD Thesis, Department of Computer Science, University of Minnesota, 2000.
-
(2000)
Security in Ajanta Mobile Agent System
-
-
Karnik, N.1
-
15
-
-
0031192553
-
Agent TCL: Targeting the needs of mobile computers
-
July-August
-
D. Kotz, R. Gray, S. Nog, D. Rus, S. Chawala, and G. Cybenko, "Agent TCL: Targeting the needs of mobile computers," IEEE Internet Computing 1(4), July-August 1997, 58-67.
-
(1997)
IEEE Internet Computing
, vol.1
, Issue.4
, pp. 58-67
-
-
Kotz, D.1
Gray, R.2
Nog, S.3
Rus, D.4
Chawala, S.5
Cybenko, G.6
-
17
-
-
3543058010
-
-
Microsoft Corporation, "Authenticode Technology," http://msdn.microsoft.com/library/security/authenticode
-
Authenticode Technology
-
-
-
18
-
-
0003681204
-
-
Addison-Wesley, Reading
-
D. S. Milojicic, F. Douglis, and R. Wheeler (Eds.), Mobility: Processes, Computers and Agents, Addison-Wesley, Reading, 1999.
-
(1999)
Mobility: Processes, Computers and Agents
-
-
Milojicic, D.S.1
Douglis, F.2
Wheeler, R.3
-
20
-
-
0026119329
-
-
F. Rabitti, E. Bertino, W. Kim, and D. Woelk, "A model of authorization for next generation database systems," ??? 16(1), 1991, 88-131.
-
(1991)
A Model of Authorization for Next Generation Database Systems
, vol.16
, Issue.1
, pp. 88-131
-
-
Rabitti, F.1
Bertino, E.2
Kim, W.3
Woelk, D.4
-
24
-
-
0037093798
-
Design of the Ajanta system for mobile agent programming
-
May
-
A. Tripathi, N. Karnik, T. Ahmed, R. D. Singh, A. Prakash, V. Kakani, M. K. Vora, and M. Pathak, "Design of the Ajanta system for mobile agent programming," Journal of Systems and Software, May 2002.
-
(2002)
Journal of Systems and Software
-
-
Tripathi, A.1
Karnik, N.2
Ahmed, T.3
Singh, R.D.4
Prakash, A.5
Kakani, V.6
Vora, M.K.7
Pathak, M.8
-
29
-
-
0002717089
-
Cryptographic traces for mobile agents
-
G. Vigna, "Cryptographic traces for mobile agents," Mobile Agent Security, Vol. 1419, 1998.
-
(1998)
Mobile Agent Security
, vol.1419
-
-
Vigna, G.1
-
31
-
-
0346166969
-
Language issues in mobile program security
-
Lecture Notes in Computer Science
-
D. Volpano and G. Smith, "Language issues in mobile program security," in Mobile Agents and Security, Lecture Notes in Computer Science, Vol. 1419, 1998.
-
(1998)
Mobile Agents and Security
, vol.1419
-
-
Volpano, D.1
Smith, G.2
-
32
-
-
0003262481
-
Telescript technology: Mobile agents
-
J. M. Bradshaw, Ed., AAAI/MIT Press
-
J. E. White, "Telescript technology: Mobile agents," in Software Agents, J. M. Bradshaw, Ed., AAAI/MIT Press, 1997, pp. 437-472.
-
(1997)
Software Agents
, pp. 437-472
-
-
White, J.E.1
-
33
-
-
84982946701
-
A sanctuary for mobile agents
-
Lecture Notes in Computer Science
-
B. Yee, "A sanctuary for mobile agents," in Secure Internet Programming, Lecture Notes in Computer Science, Vol. 1603, 1999.
-
(1999)
Secure Internet Programming
, vol.1603
-
-
Yee, B.1
|