메뉴 건너뛰기




Volumn , Issue , 2008, Pages

Evaluation of security and fault tolerance in mobile agents

Author keywords

Fault tolerant; Mobile agent; Mobile code; Network management; Security

Indexed keywords

CODES (SYMBOLS); COMPUTER NETWORKS; CRYPTOGRAPHY; FAULT TOLERANCE; FAULT TOLERANT COMPUTER SYSTEMS; FINANCIAL DATA PROCESSING; INFORMATION SERVICES; OPTICAL COMMUNICATION; PHOTONICS; QUALITY ASSURANCE; RELIABILITY; SEARCH ENGINES;

EID: 51049088644     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WOCN.2008.4542509     Document Type: Conference Paper
Times cited : (24)

References (19)
  • 1
    • 33646855810 scopus 로고    scopus 로고
    • H.Hamidi, Modeling Fault Tolerant and Secure Mobile Agent Execution in Distributed Systems, International Journal of Intelligent Information Technologies (IJIIT 2(1)), pp.21-36,2006.
    • H.Hamidi, " Modeling Fault Tolerant and Secure Mobile Agent Execution in Distributed Systems," International Journal of Intelligent Information Technologies (IJIIT 2(1)), pp.21-36,2006.
  • 4
    • 0035789432 scopus 로고    scopus 로고
    • Proc. 2001 Int'l Conf on Dependable Systems and networks,pp.215-224,luI.2001
    • S. Pleisch and A. Schiper, "FATOMAS - A Fault-Tolerant Mobile Agent System Based on the Agent-Dependent Approach," Proc. 2001 Int'l Conf on Dependable Systems and networks,pp.215-224,luI.2001.
    • Pleisch, S.1    Schiper, A.2
  • 8
    • 0002848392 scopus 로고    scopus 로고
    • Ajents: Towards an Environment for Parallel, Distributed and Mobile Java Applications
    • June
    • M. Izatt, P. Chan, and T. Brecht. Ajents: Towards an Environment for Parallel, Distributed and Mobile Java Applications. In Proc. ACM 1999 Conference on Java Grande, pages 15-24, June 1999.
    • (1999) Proc. ACM 1999 Conference on Java Grande , pp. 15-24
    • Izatt, M.1    Chan, P.2    Brecht, T.3
  • 9
    • 10044219914 scopus 로고    scopus 로고
    • M.Shiraishi, T.Enokido and M.Takizawa Fault - Tolerant Mobile Agents in Distributed Objects Systemsproc,of the Ninth IEEE Workshop on Future Trends of Distributed Computer Systems(FTDCS,03), pp. 11-20 ,2003.
    • M.Shiraishi, T.Enokido and M.Takizawa" Fault - Tolerant Mobile Agents in Distributed Objects Systems"proc,of the Ninth IEEE Workshop on Future Trends of Distributed Computer Systems(FTDCS,03), pp. 11-20 ,2003.
  • 12
    • 0003197918 scopus 로고    scopus 로고
    • Protecting Mobile Agents Against Malicious Hosts
    • Giovanni Vigna, editor, Mobile Agents and Security, Springer
    • Tomas Sander and Christian F. Tschudin. "Protecting Mobile Agents Against Malicious Hosts". In Giovanni Vigna, editor, Mobile Agents and Security, LNCS 1419, p. 44-60. Springer, 1998.
    • (1998) LNCS , vol.1419 , pp. 44-60
    • Sander, T.1    Tschudin, C.F.2
  • 13
    • 84958979325 scopus 로고    scopus 로고
    • Mobile Code Paradigms and Technologies: A Case Study
    • Kurt Rothermet, Radu Popescu-Zeletin, editors, Mobile Agents, First International Workshop, MA'97, Berlin, Germany, April 1997, Proceedings, Springer
    • Carlo Ghezzi and Giovanni Vigna. "Mobile Code Paradigms and Technologies: A Case Study". In Kurt Rothermet, Radu Popescu-Zeletin, editors, Mobile Agents, First International Workshop, MA'97, Berlin, Germany, April 1997, Proceedings, LNCS 1219, p. 39-49. Springer, 1997.
    • (1997) LNCS , vol.1219 , pp. 39-49
    • Ghezzi, C.1    Vigna, G.2
  • 14
    • 0035195853 scopus 로고    scopus 로고
    • th IEEE Symposium on Reliable Distributed Systems, New Orleans, USA, Oct 28-31, 2001 pp 68-69.
    • th IEEE Symposium on Reliable Distributed Systems, New Orleans, USA, Oct 28-31, 2001 pp 68-69.
  • 15
    • 0242706484 scopus 로고    scopus 로고
    • On Assigning Priorities of Keying Parameters in a Secure Mobile Network
    • Technical Report, Department of Computer Science, Purdue University, Oct
    • D. McClure, B. Bhargava, On Assigning Priorities of Keying Parameters in a Secure Mobile Network Technical Report, Department of Computer Science, Purdue University, Oct 2001.
    • (2001)
    • McClure, D.1    Bhargava, B.2
  • 16
    • 51049103519 scopus 로고    scopus 로고
    • F.Hohl.A Model of Attacks of Malicious Hosts Against Mobile Agents.proceedings of the ECOOP Workshop on Distributed Object Security and 4th Workshop on Object systems:Secure Internet Mobile Computations ,p.105-120.INRIA,France ,1998.
    • F.Hohl."A Model of Attacks of Malicious Hosts Against Mobile Agents".proceedings of the ECOOP Workshop on Distributed Object Security and 4th Workshop on Object systems:Secure Internet Mobile Computations ,p.105-120.INRIA,France ,1998.
  • 17
    • 0001943763 scopus 로고    scopus 로고
    • Time Limited Blackbox Security: Protecting Mobile Agents from Mali cious Hosts
    • Giovanni Vigna, editor, Mobile Agents and Security, Springer
    • Fritz Hohl. "Time Limited Blackbox Security: Protecting Mobile Agents from Mali cious Hosts". In Giovanni Vigna, editor, Mobile Agents and Security, LNCS 1419, p. 92-113. Springer, 1998.
    • (1998) LNCS , vol.1419 , pp. 92-113
    • Hohl, F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.