메뉴 건너뛰기




Volumn , Issue , 2004, Pages 941-960

Security for mobile agents: Issues and challenges

Author keywords

[No Author keywords available]

Indexed keywords


EID: 77952490155     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1201/9780203504086     Document Type: Chapter
Times cited : (7)

References (60)
  • 4
    • 0036576253 scopus 로고    scopus 로고
    • Special issue on applicability of mobile agents to telecommunication
    • R.H. Glitho and T. Magedanz, Eds., Special Issue on Applicability of Mobile Agents to Telecommunications, IEEE Network, vol. 16, no. 3, 2002.
    • (2002) IEEE Network , vol.16 , Issue.3
    • Glitho, R.H.1    Magedanz, T.2
  • 6
    • 0034315517 scopus 로고    scopus 로고
    • Countermeasures for mobile agent security
    • W. Jansen, Countermeasures for Mobile Agent Security, Computer Communications, vol. 23, no. 17, 2000.
    • (2000) Computer Communications , vol.23 , Issue.17
    • Jansen, W.1
  • 8
    • 0002717089 scopus 로고    scopus 로고
    • Mobile agents and security
    • New York: Springer-Verlag
    • G. Vigna, Mobile Agents and Security, Lecture Notes in Computer Science vol. 1419, New York: Springer-Verlag, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1419
    • Vigna, G.1
  • 9
    • 0032665338 scopus 로고    scopus 로고
    • Security issues related to mobile code and agent-based systems
    • R. Oppliger, Security Issues Related to Mobile Code and Agent-Based Systems, Computer Communications, vol. 22, no. 12, 1999.
    • (1999) Computer Communications , vol.22 , Issue.12
    • Oppliger, R.1
  • 11
    • 0037362952 scopus 로고    scopus 로고
    • Protecting mobile code in the wild
    • J. Zachary, Protecting Mobile Code in the Wild, IEEE Internet Computing, vol. 7, no. 2, 2003.
    • (2003) IEEE Internet Computing , vol.7 , Issue.2
    • Zachary, J.1
  • 17
    • 0012077289 scopus 로고    scopus 로고
    • Attribute certification: An enabling technology for delegation and role-based controls in distributed environments
    • Fairfax, VA
    • J. Linn and M. Nystrom, Attribute Certification: an Enabling Technology for Delegation and Role-Based Controls in Distributed Environments, 4th ACM Workshop on Role-Based Access Control (RBAC’99), Fairfax, VA, 1999.
    • (1999) 4th ACM Workshop on Role-Based Access Control (RBAĆ 99)
    • Linn, J.1    Nystrom, M.2
  • 24
    • 0003313661 scopus 로고    scopus 로고
    • Java security: Present and near future
    • L. Gong, Java Security: Present and Near Future, IEEE Micro, vol. 17, no. 3, 1997.
    • (1997) IEEE Micro , vol.17 , Issue.3
    • Gong, L.1
  • 33
    • 0001943763 scopus 로고    scopus 로고
    • Time limited blackbox security: Protecting mobile agents from malicious hosts
    • New York: Springer-Verlag
    • F. Hohl, Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts, Mobile Agents and Security, Lecture Notes in Computer Science, vol. 1419, New York: Springer-Verlag, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1419
    • Hohl, F.1
  • 34
    • 0003197918 scopus 로고    scopus 로고
    • Protecting mobile agents against malicious hosts
    • New York: Springer-Verlag
    • T. Sander and C. Tschudin, Protecting Mobile Agents Against Malicious Hosts, Mobile Agents and Security, Lecture Notes in Computer Science, vol. 1419, New York: Springer-Verlag, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1419
    • Sander, T.1    Tschudin, C.2
  • 35
    • 0003249402 scopus 로고    scopus 로고
    • Environmental key generation toward clueless agents
    • New York: Springer-Verlag
    • J. Riordan and B. Schneier, Environmental Key Generation toward Clueless Agents, Mobile Agents and Security, Lecture Notes in Computer Science, vol. 1419, New York: Springer-Verlag, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1419
    • Riordan, J.1    Schneier, B.2
  • 39
    • 0033189746 scopus 로고    scopus 로고
    • Mobile agents integrity for electronic commerce applications
    • Information Systems
    • A. Corradi, M. Cremonini, R. Montanari, and C. Stefanelli, Mobile Agents Integrity for Electronic Commerce Applications, Information Systems, vol. 24, no. 6, 1999.
    • (1999) Information Systems , vol.24 , Issue.6
    • Corradi, A.1    Cremonini, M.2    Montanari, R.3    Stefanelli, C.4
  • 40
    • 0002717089 scopus 로고    scopus 로고
    • Cryptographic traces for mobile agents
    • New York: Springer-Verlag
    • G. Vigna, Cryptographic Traces for Mobile Agents, Mobile Agents and Security, Lecture Notes in Computer Science, vol. 1419, New York: Springer-Verlag, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1419
    • Vigna, G.1
  • 41
    • 33846619550 scopus 로고    scopus 로고
    • Toward fault tolerant and secure agentry
    • New York: Springer-Verlag
    • B. Shneider, Toward Fault Tolerant and Secure Agentry, 11th International Workshop on Distributed Algorithms, Lecture Notes in Computer Science, vol. 1320, New York: Springer-Verlag, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1320
    • Shneider, B.1
  • 45
    • 0002992633 scopus 로고    scopus 로고
    • D’agents: Security in a multiple-language, mobile-agent system
    • New York: Springer-Verlag
    • R. Gray, G. Cybenko, D. Kotz, and D. Rus, D’Agents: Security in a Multiple-Language, Mobile-Agent System, Mobile Agent Security, Lecture Notes in Computer Science, vol 1419, New York: Springer-Verlag, 1998.
    • (1998) Mobile Agent Security , vol.1419
    • Gray, R.1    Cybenko, G.2    Kotz, D.3    Rus, D.4
  • 52
    • 0036452572 scopus 로고    scopus 로고
    • Java for on-line distributed monitoring of heterogeneous systems and services
    • P. Bellavista, A. Corradi, and C. Stefanelli, Java for On-Line Distributed Monitoring of Heterogeneous Systems and Services, The Computer Journal, vol. 45, no. 6, 2002.
    • (2002) The Computer Journal , vol.45 , Issue.6
    • Bellavista, P.1    Corradi, A.2    Stefanelli, C.3
  • 54
    • 0036870378 scopus 로고    scopus 로고
    • Building trustworthy software agents
    • A. Patrick, Building Trustworthy Software Agents, IEEE Internet Computing, vol. 6, no. 6, 2002.
    • (2002) IEEE Internet Computing , vol.6 , Issue.6
    • Patrick, A.1
  • 56
    • 0345381606 scopus 로고    scopus 로고
    • Special issue on policy based networking
    • S. Wright, R. Chadha, and G. Lapiotis, Special Issue on Policy Based Networking, IEEE Network, vol. 16, no. 2, 2002.
    • (2002) IEEE Network , vol.16 , Issue.2
    • Wright, S.1    Chadha, R.2    Lapiotis, G.3
  • 60
    • 0142156668 scopus 로고    scopus 로고
    • Cosmos: A context-centric access control middleware for mobile environments
    • 5th International Worshop on Mobile Agents for Telecommunication Applications (MATA’03), New York: Springer-Verlag
    • P. Bellavista, R. Montanari, and D. Tibaldi, COSMOS: a Context-Centric Access Control Middleware for Mobile Environments, 5th International Worshop on Mobile Agents for Telecommunication Applications (MATA’03), Lecture Notes in Computer Science, vol. 2881, New York: Springer-Verlag, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2881
    • Bellavista, P.1    Montanari, R.2    Tibaldi, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.