메뉴 건너뛰기




Volumn , Issue , 2007, Pages 663-668

Evaluation of authentication mechanisms for mobile agents on top of Java

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; AGENTS; AUTHENTICATION; COMMUNICATION; COMPUTER PROGRAMMING LANGUAGES; CYBERNETICS; INDUSTRIAL MANAGEMENT; INFORMATION MANAGEMENT; INFORMATION SCIENCE; KNOWLEDGE MANAGEMENT; MECHANISMS; PUBLIC KEY CRYPTOGRAPHY; STABILIZERS (AGENTS); TELECOMMUNICATION NETWORKS;

EID: 46749100550     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICIS.2007.97     Document Type: Conference Paper
Times cited : (8)

References (28)
  • 2
    • 46749129636 scopus 로고    scopus 로고
    • Securing Mobile Agents for Electronic Commerce: An Experiment
    • ISBN: 0-7923-7914-4
    • A. Chan, C. Wong, T. Wong, M. Lyu. "Securing Mobile Agents for Electronic Commerce: An Experiment", IFIP Conference Proceedings, vol. 175, pp. 471-480, ISBN: 0-7923-7914-4, 2000
    • (2000) IFIP Conference Proceedings , vol.175 , pp. 471-480
    • Chan, A.1    Wong, C.2    Wong, T.3    Lyu, M.4
  • 4
    • 34548161907 scopus 로고    scopus 로고
    • Mobile Agent Facility Specification
    • August, URL
    • International Business Machines Corporation: "Mobile Agent Facility Specification". OMG TC Document cf/96-08-01, August 1996, URL: http://www.trl.ibm.co.jp/aglets/maf.ps
    • (1996) OMG TC Document cf/96-08-01
  • 10
    • 46749150879 scopus 로고    scopus 로고
    • D. Alexander, P. Menage, A. Keromytis. The price of Safety in an Active Network. SIOCOMM '99
    • D. Alexander, P. Menage, A. Keromytis. "The price of Safety in an Active Network". SIOCOMM '99
  • 13
    • 0004198635 scopus 로고    scopus 로고
    • ISBN-10:, ISBN-13: 978-0-13-035548-5. Prentice Hall. Published: 02 December, Upper Saddle River, NJ: Prentice Hall
    • Charles P. Pfleeger and Shari Lawrence Pfleeger. "Security in Computing". ISBN-10: 0-13-035548-8; ISBN-13: 978-0-13-035548-5. Prentice Hall. Published: 02 December 2002. Upper Saddle River, NJ: Prentice Hall
    • (2002) Security in Computing
    • Pfleeger, C.P.1    Lawrence Pfleeger, S.2
  • 16
    • 34548176551 scopus 로고    scopus 로고
    • Agent Tel. Itinerant Agents: Explanations and Examples with CDROM
    • Zypa editors, Manning Publishing and Prentice Hall
    • Robert S. Gray, George Cybenko, David Kotz, and Daniela Rus. "Agent Tel. Itinerant Agents: Explanations and Examples with CDROM. William Cockayne and Michael Zypa (editors), Manning Publishing and Prentice Hall, 1997
    • (1997) William Cockayne and Michael
    • Gray, R.S.1    Cybenko, G.2    Kotz, D.3    Rus, D.4
  • 17
    • 46149151346 scopus 로고    scopus 로고
    • Programming and Deploying Java Mobile Agents with Aglets
    • August
    • D. Lange and O. Mitsuru. "Programming and Deploying Java Mobile Agents with Aglets. Addison-Wesley Pub Co, ISBM: 0-201-32582-9, August 1998
    • (1998) Addison-Wesley Pub Co, ISBM
    • Lange, D.1    Mitsuru, O.2
  • 18
    • 0002992633 scopus 로고    scopus 로고
    • D'Agents: Security in a multiple-language, mobile-agent system
    • Mobile Agents and Security, Giovanni Vigna Editor, Springer Verlag, pp
    • Robert S. Gray, David Kotz, George Cybenko, and Daniela Rus. "D'Agents: Security in a multiple-language, mobile-agent system", In Mobile Agents and Security, Giovanni Vigna (Editor), Lecture Notes in Computer Science, Springer Verlag, pp. 154-187, 1998
    • (1998) Lecture Notes in Computer Science , pp. 154-187
    • Gray, R.S.1    Kotz, D.2    Cybenko, G.3    Rus, D.4
  • 19
    • 46749086930 scopus 로고    scopus 로고
    • Sun Microsystems. JDK 5.0 Documentation. Sun Microsystems, 2004, URL: http://java.sun.com/j2se/1.5.0/docs/
    • Sun Microsystems. "JDK 5.0 Documentation". Sun Microsystems, 2004, URL: http://java.sun.com/j2se/1.5.0/docs/
  • 21
    • 46749129223 scopus 로고    scopus 로고
    • Pankaj Kumar. J2EE Security for Servlets, EJBs, and Web Services. ISBN-10: 0-13-140264-1; ISBN-13: 978-0-13-140264-5; Prentice Hall. Published: 04 September, 2003
    • Pankaj Kumar. "J2EE Security for Servlets, EJBs, and Web Services. ISBN-10: 0-13-140264-1; ISBN-13: 978-0-13-140264-5; Prentice Hall. Published: 04 September, 2003
  • 23
    • 34548162898 scopus 로고    scopus 로고
    • Secure Hash Standard (SHS)
    • Federal Information Processing Standards FIPS, Publication, August
    • Federal Information Processing Standards (FIPS). "Secure Hash Standard (SHS)". Publication 182-2, 01 August 2992
    • , vol.182 -2 , Issue.1 , pp. 2992
  • 24
    • 46749126451 scopus 로고    scopus 로고
    • Sun Microsystems. keytool - Key and Certificate Management Tool. Copyright 2001. http://java.sun.com/j2se/1.3/docs/tooldocs/win32/ keytool.html
    • Sun Microsystems. "keytool - Key and Certificate Management Tool". Copyright 2001. http://java.sun.com/j2se/1.3/docs/tooldocs/win32/ keytool.html
  • 27
    • 0037362952 scopus 로고    scopus 로고
    • Protecting Mobile Code in the Wild
    • March/April
    • John Zachary. "Protecting Mobile Code in the Wild", IEEE Computer Society. March/April 2003 (Vol. 7, No. 2) pp 78 - 82
    • (2003) IEEE Computer Society , vol.7 , Issue.2 , pp. 78-82
    • Zachary, J.1
  • 28
    • 46749111322 scopus 로고    scopus 로고
    • Sun Microsystems. Java Cryptography Extension. http://java.sun.com/products/jce/. Copyright 1994-2006 Sun Microsystems, Inc
    • Sun Microsystems. "Java Cryptography Extension". http://java.sun.com/products/jce/. Copyright 1994-2006 Sun Microsystems, Inc


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.