메뉴 건너뛰기




Volumn , Issue , 2009, Pages 341-348

SecMiLiA: An approach in the agent protection

Author keywords

[No Author keywords available]

Indexed keywords

AGENT MIGRATION PROTOCOL; AGENT-BASED COMPUTING; AGENT-BASED SYSTEMS; DISTRIBUTED COMPUTING; MALICIOUS HOST; MOBILE AGENT SYSTEM; MODEL CHECKING TOOLS; REAL-WORLD APPLICATION; SECURITY PROBLEMS; TRUSTED COMPUTING TECHNOLOGY;

EID: 70349665527     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2009.50     Document Type: Conference Paper
Times cited : (3)

References (12)
  • 1
    • 33750044138 scopus 로고    scopus 로고
    • Trusted computing group:, available online at
    • Trusted computing group: Tcg specifications. 2005. available online at https://www.trustedcomputinggroup.org/specs/.
    • (2005) Tcg specifications
  • 2
    • 70349661176 scopus 로고    scopus 로고
    • A. G. Carl and P.Homeier and S. Nettles. Infrastructure for proof-referencing code. In Proceedings, Workshop on Foundations of Secure Mobile Code., 1997.
    • A. G. Carl and P.Homeier and S. Nettles. Infrastructure for proof-referencing code. In Proceedings, Workshop on Foundations of Secure Mobile Code., 1997.
  • 3
    • 0041916251 scopus 로고    scopus 로고
    • Watermarking, tamperproofing, and obfuscation - tools for software protection
    • 170. 2000
    • C. Collberg and Thomborson. Watermarking, tamperproofing, and obfuscation - tools for software protection. University of Auckland Technical Report 170. 2000.
    • University of Auckland Technical Report
    • Collberg, C.1    Thomborson2
  • 5
    • 0003802916 scopus 로고    scopus 로고
    • PhD thesis, Department of Computer Science, University of Minnesota
    • N. Karnik. Security in Mobile Agents systems. PhD thesis, Department of Computer Science, University of Minnesota., 1998.
    • (1998) Security in Mobile Agents systems
    • Karnik, N.1
  • 7
    • 38049025181 scopus 로고    scopus 로고
    • Towards secure agent computing for ubiquitous computing and ambient intelligence
    • Fourth International Conference, Ubiquitous Intelligence and Computing
    • A. Maña and A. Muñoz and D. Serrano. Towards secure agent computing for ubiquitous computing and ambient intelligence. Fourth International Conference, Ubiquitous Intelligence and Computing, LNCS, 2007.
    • (2007) LNCS
    • Maña, A.1    Muñoz, A.2    Serrano, D.3
  • 8
    • 0030685617 scopus 로고    scopus 로고
    • G. Necula. Proof-carrying code. In Proceedings of 24th Annual Symposium on Principles of Programming Languages., 1997.
    • G. Necula. Proof-carrying code. In Proceedings of 24th Annual Symposium on Principles of Programming Languages., 1997.
  • 9
    • 0027836576 scopus 로고    scopus 로고
    • R. Wahbe and S. Lucco and T. E. Anderson and S. L. Graham. Efficient software-based fault isolation. In Proceedings of the 14th ACM Symposium on Operating Systems Principles., pages 203-216, 1993.
    • R. Wahbe and S. Lucco and T. E. Anderson and S. L. Graham. Efficient software-based fault isolation. In Proceedings of the 14th ACM Symposium on Operating Systems Principles., pages 203-216, 1993.
  • 10
    • 84982937984 scopus 로고    scopus 로고
    • V. Roth. Mutual protection of cooperating agents. In Secure Internet Programming: Security Issues for Mobile and Distributed Objects., 1906 of LNCS. Springer-Verlag., 1999.
    • V. Roth. Mutual protection of cooperating agents. In Secure Internet Programming: Security Issues for Mobile and Distributed Objects., 1906 of LNCS. Springer-Verlag., 1999.
  • 11
    • 84947921326 scopus 로고    scopus 로고
    • J. Stern and G. Hachez and F. Koeune and J. J. Quisquater. Robust object watermarking: Application to code. In Proceedings of Info Hiding '99, Springer-Verlag., LNCS 1768.:pp. 368-378, 1999.
    • J. Stern and G. Hachez and F. Koeune and J. J. Quisquater. Robust object watermarking: Application to code. In Proceedings of Info Hiding '99, Springer-Verlag., LNCS 1768.:pp. 368-378, 1999.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.