-
1
-
-
85057450128
-
Special issue on applicability of mobile agents to telecommunication
-
Boca Raton, FL: CRC Press
-
P. Bellavista, D. Bottazzi, A. Corradi, R. Montanari, and S. Vecchi, Mobile Agent Middlewares for Context-Aware Applications, Section III, Handbook of Mobile Computing, Boca Raton, FL: CRC Press, 2003.
-
(2003)
Handbook of Mobile Computing
-
-
Bellavista, P.1
Bottazzi, D.2
Corradi, A.3
Montanari, R.4
Vecchi, S.5
-
2
-
-
4544373958
-
Understanding code mobility
-
A. Fuggetta, G.P. Picco, and G. Vigna, Understanding Code Mobility, IEEE Transactionson Software Engineering, vol. 24, no. 5, 1998.
-
(1998)
IEEE Transactionson Software Engineering
, vol.24
, Issue.5
-
-
Fuggetta, A.1
Picco, G.P.2
Vigna, G.3
-
4
-
-
0036576253
-
Special issue on applicability of mobile agents to telecommunication
-
R.H. Glitho and T. Magedanz, Eds., Special Issue on Applicability of Mobile Agents to Telecommunications, IEEE Network, vol. 16, no. 3, 2002.
-
(2002)
IEEE Network
, vol.16
, Issue.3
-
-
Glitho, R.H.1
Magedanz, T.2
-
5
-
-
0032123682
-
Mobile agents and security
-
M.S. Greenberg, J.C. Byington, T. Holding, and D.G. Harper, Mobile Agents and Security, IEEE Communications Magazine, vol. 36, no. 7, 1998.
-
(1998)
IEEE Communications Magazine
, vol.36
, Issue.7
-
-
Greenberg, M.S.1
Byington, J.C.2
Holding, T.3
Harper, D.G.4
-
6
-
-
0034315517
-
Countermeasures for mobile agent security
-
W. Jansen, Countermeasures for Mobile Agent Security, Computer Communications, vol. 23, no. 17, 2000.
-
(2000)
Computer Communications
, vol.23
, Issue.17
-
-
Jansen, W.1
-
7
-
-
18944371073
-
Path-based security for mobile agents
-
G. Knoll, N. Suri, and J.M. Bardshaw, Path-Based Security for Mobile Agents, ElectronicNotes in Theoretical Computer Science, vol. 58, no. 2, 2002.
-
(2002)
ElectronicNotes in Theoretical Computer Science
, vol.58
, Issue.2
-
-
Knoll, G.1
Suri, N.2
Bardshaw, J.M.3
-
8
-
-
0002717089
-
Mobile agents and security
-
New York: Springer-Verlag
-
G. Vigna, Mobile Agents and Security, Lecture Notes in Computer Science vol. 1419, New York: Springer-Verlag, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1419
-
-
Vigna, G.1
-
9
-
-
0032665338
-
Security issues related to mobile code and agent-based systems
-
R. Oppliger, Security Issues Related to Mobile Code and Agent-Based Systems, Computer Communications, vol. 22, no. 12, 1999.
-
(1999)
Computer Communications
, vol.22
, Issue.12
-
-
Oppliger, R.1
-
11
-
-
0037362952
-
Protecting mobile code in the wild
-
J. Zachary, Protecting Mobile Code in the Wild, IEEE Internet Computing, vol. 7, no. 2, 2003.
-
(2003)
IEEE Internet Computing
, vol.7
, Issue.2
-
-
Zachary, J.1
-
14
-
-
0042850652
-
Taking back cyberspace
-
J. Bradshaw, G. Cabri, and R. Montanari, Taking Back Cyberspace, IEEE Computer, vol. 36, no. 7, 2003.
-
(2003)
IEEE Computer
, vol.36
, Issue.7
-
-
Bradshaw, J.1
Cabri, G.2
Montanari, R.3
-
17
-
-
0012077289
-
Attribute certification: An enabling technology for delegation and role-based controls in distributed environments
-
Fairfax, VA
-
J. Linn and M. Nystrom, Attribute Certification: an Enabling Technology for Delegation and Role-Based Controls in Distributed Environments, 4th ACM Workshop on Role-Based Access Control (RBAC’99), Fairfax, VA, 1999.
-
(1999)
4th ACM Workshop on Role-Based Access Control (RBAĆ 99)
-
-
Linn, J.1
Nystrom, M.2
-
19
-
-
85057444735
-
Anchor toolkit – a secure mobile agent system
-
Palm Springs, CA
-
S. Mudumbai, A. Essiari, and W. Johnston, Anchor Toolkit — a Secure Mobile Agent System, 3rd International Symposium on Mobile Agents (ASA/MA’99), Palm Springs, CA, October 1999.
-
(1999)
3rd International Symposium on Mobile Agents (ASA/Mǁ 99)
-
-
Mudumbai, S.1
Essiari, A.2
Johnston, W.3
-
21
-
-
0029392001
-
Itinerant agents for mobile computing
-
D. Chess, B. Grosof, C. Harrison, D. Levine, C. Parris, and G. Tsudik, Itinerant Agents for Mobile Computing, IEEE Personal Communications, vol. 2, no. 5, 1995.
-
(1995)
IEEE Personal Communications
, vol.2
, Issue.5
-
-
Chess, D.1
Grosof, B.2
Harrison, C.3
Levine, D.4
Parris, C.5
Tsudik, G.6
-
24
-
-
0003313661
-
Java security: Present and near future
-
L. Gong, Java Security: Present and Near Future, IEEE Micro, vol. 17, no. 3, 1997.
-
(1997)
IEEE Micro
, vol.17
, Issue.3
-
-
Gong, L.1
-
27
-
-
0001885557
-
The role of trust management in distributed systems security
-
New York: Springer-Verlag
-
M. Blaze, J. Feigenbaum, J. Ioannidis, and A.D. Keromytis, The Role of Trust Management in Distributed Systems Security, Secure Internet Programming: Issues in Distributes and Mobile Object Systems, New York: Springer-Verlag, 1999.
-
(1999)
Secure Internet Programming: Issues in Distributes and Mobile Object Systems
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.D.4
-
30
-
-
84936869135
-
Ponder: Realising enterprise viewpoint concepts
-
Makuhari, Japan
-
E. Lupu, M. Sloman, N. Dulay, and N. Damianou, Ponder: Realising Enterprise Viewpoint Concepts, 4th International Enterprise Distributed Object Computing Conference, Makuhari, Japan, 2000.
-
(2000)
4th International Enterprise Distributed Object Computing Conference
-
-
Lupu, E.1
Sloman, M.2
Dulay, N.3
Damianou, N.4
-
32
-
-
0011255179
-
Introducing trusted third parties to the mobile agent paradigm
-
J. Vitek and C. Jensen, New York: Springer-Verlag
-
U.G. Wilhelm, S. Staamann, and L. Butty, Introducing Trusted Third Parties to the Mobile Agent Paradigm. In J. Vitek and C. Jensen, Eds., Secure Internet Programming: Security Issues for Mobile and Distributed Objects, New York: Springer-Verlag, 1999.
-
(1999)
Secure Internet Programming: Security Issues for Mobile and Distributed Objects
-
-
Wilhelm, U.G.1
Staamann, S.2
Butty, L.3
-
33
-
-
0001943763
-
Time limited blackbox security: Protecting mobile agents from malicious hosts
-
New York: Springer-Verlag
-
F. Hohl, Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts, Mobile Agents and Security, Lecture Notes in Computer Science, vol. 1419, New York: Springer-Verlag, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1419
-
-
Hohl, F.1
-
34
-
-
0003197918
-
Protecting mobile agents against malicious hosts
-
New York: Springer-Verlag
-
T. Sander and C. Tschudin, Protecting Mobile Agents Against Malicious Hosts, Mobile Agents and Security, Lecture Notes in Computer Science, vol. 1419, New York: Springer-Verlag, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1419
-
-
Sander, T.1
Tschudin, C.2
-
35
-
-
0003249402
-
Environmental key generation toward clueless agents
-
New York: Springer-Verlag
-
J. Riordan and B. Schneier, Environmental Key Generation toward Clueless Agents, Mobile Agents and Security, Lecture Notes in Computer Science, vol. 1419, New York: Springer-Verlag, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1419
-
-
Riordan, J.1
Schneier, B.2
-
36
-
-
4344686608
-
Security models and abstractions in a mobile agent environment
-
Stanford, CA
-
A. Corradi, M. Creminini, and C. Stefanelli, Security Models and Abstractions in a Mobile Agent Environment, IEEE Workshop on Collaboration in Presence of Mobility, Stanford, CA, 1998.
-
(1998)
IEEE Workshop on Collaboration in Presence of Mobility
-
-
Corradi, A.1
Creminini, M.2
Stefanelli, C.3
-
38
-
-
0000709927
-
Protecting the computation results of free-roaming agents
-
Stuttgart, Germany
-
G. Karjoth, N. Asokan, and C. Gülcü, Protecting the Computation Results of Free-Roaming Agents, 2nd International Workshop on Mobile Agents, Stuttgart, Germany, 1998.
-
(1998)
2nd International Workshop on Mobile Agents
-
-
Karjoth, G.1
Asokan, N.2
Gülcü, C.3
-
39
-
-
0033189746
-
Mobile agents integrity for electronic commerce applications
-
Information Systems
-
A. Corradi, M. Cremonini, R. Montanari, and C. Stefanelli, Mobile Agents Integrity for Electronic Commerce Applications, Information Systems, vol. 24, no. 6, 1999.
-
(1999)
Information Systems
, vol.24
, Issue.6
-
-
Corradi, A.1
Cremonini, M.2
Montanari, R.3
Stefanelli, C.4
-
40
-
-
0002717089
-
Cryptographic traces for mobile agents
-
New York: Springer-Verlag
-
G. Vigna, Cryptographic Traces for Mobile Agents, Mobile Agents and Security, Lecture Notes in Computer Science, vol. 1419, New York: Springer-Verlag, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1419
-
-
Vigna, G.1
-
41
-
-
33846619550
-
Toward fault tolerant and secure agentry
-
New York: Springer-Verlag
-
B. Shneider, Toward Fault Tolerant and Secure Agentry, 11th International Workshop on Distributed Algorithms, Lecture Notes in Computer Science, vol. 1320, New York: Springer-Verlag, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1320
-
-
Shneider, B.1
-
42
-
-
84958953927
-
Concordia: An infrastructure for collaborating mobile agents
-
New York: Springer-Verlag
-
D. Wong, N. Paciorek, T. Walsh, J. DiCelie, M. Young, and B. Peet, Concordia: an Infrastructure for Collaborating Mobile Agents, 1st International Workshop on Mobile Agents, Lecture Notes in Computer Science, Vol. 1219, New York: Springer-Verlag, 1997.
-
(1997)
1st International Workshop on Mobile Agents, Lecture Notes in Computer Science
, vol.1219
-
-
Wong, D.1
Paciorek, N.2
Walsh, T.3
Di Celie, J.4
Young, M.5
Peet, B.6
-
45
-
-
0002992633
-
D’agents: Security in a multiple-language, mobile-agent system
-
New York: Springer-Verlag
-
R. Gray, G. Cybenko, D. Kotz, and D. Rus, D’Agents: Security in a Multiple-Language, Mobile-Agent System, Mobile Agent Security, Lecture Notes in Computer Science, vol 1419, New York: Springer-Verlag, 1998.
-
(1998)
Mobile Agent Security
, vol.1419
-
-
Gray, R.1
Cybenko, G.2
Kotz, D.3
Rus, D.4
-
47
-
-
84958758819
-
Implementation of secure architectures for mobile agents in MARISM-A
-
New York: Springer-Verlag
-
S. Robles, J. Mir, J. Ametller, and J. Borrell, Implementation of Secure Architectures for Mobile Agents in MARISM-A, 4th International Workshop on Mobile Agents for Telecommunication Applications (MATA’02), Lecture Notes in Computer Science, vol. 2521, New York: Springer-Verlag, 2002.
-
(2002)
4th International Workshop on Mobile Agents for Telecommunication Applications (MATA’02), Lecture Notes in Computer Science
, vol.2521
-
-
Robles, S.1
Mir, J.2
Ametller, J.3
Borrell, J.4
-
48
-
-
0035917727
-
Flexible security policies for mobile agents systems
-
R. Montanari, C. Stefanelli, and N. Dulay, Flexible Security Policies for Mobile Agents Systems, Microprocessors and Microsystems, vol. 25, no. 2, 2001.
-
(2001)
Microprocessors and Micro Systems
, vol.25
, Issue.2
-
-
Montanari, R.1
Stefanelli, C.2
Dulay, N.3
-
49
-
-
0033726322
-
NOMADS: Toward a strong and safe mobile agent system
-
Barcelona
-
N. Suri, J.M. Bradshaw, M.R. Breedy, P.T. Groth, G.A. Hill, R. Jeffers, T.S. Mitrovich, B.R. Pouliot, and D.S. Smith, NOMADS: Toward a Strong and Safe Mobile Agent System, 4th International Conference on Autonomous Agents, Barcelona, 2000.
-
(2000)
4th International Conference on Autonomous Agents
-
-
Suri, N.1
Bradshaw, J.M.2
Breedy, M.R.3
Groth, P.T.4
Hill, G.A.5
Jeffers, R.6
Mitrovich, T.S.7
Pouliot, B.R.8
Smith, D.S.9
-
50
-
-
84867375050
-
-
N. Suri, J.M. Bradshaw, M.R. Breedy, K.M. Ford, P.T. Groth, G.A. Hill, and R. Saavedra, State Capture and Resource Control for Java: the Design and Implementation of the Aroma Virtual Machine, http://nomads.coginst.uwf.edu/.
-
State Capture and Resource Control for Java: The Design and Implementation of The Aroma Virtual Machine
-
-
Suri, N.1
Bradshaw, J.M.2
Breedy, M.R.3
Ford, K.M.4
Groth, P.T.5
Hill, G.A.6
Saavedra, R.7
-
52
-
-
0036452572
-
Java for on-line distributed monitoring of heterogeneous systems and services
-
P. Bellavista, A. Corradi, and C. Stefanelli, Java for On-Line Distributed Monitoring of Heterogeneous Systems and Services, The Computer Journal, vol. 45, no. 6, 2002.
-
(2002)
The Computer Journal
, vol.45
, Issue.6
-
-
Bellavista, P.1
Corradi, A.2
Stefanelli, C.3
-
53
-
-
0033099759
-
Agents for the masses
-
IEEE Intelligent Systems
-
J.M. Bradshaw, M. Greaves, H. Holmback, T. Karygiannis, W. Jansen, B.G. Silverman, N. Suri, and A. Wong, Agents for the Masses, IEEE Intelligent Systems, vol. 14, no. 2, 1999.
-
(1999)
IEEE Intelligent Systems
, vol.14
, Issue.2
-
-
Bradshaw, J.M.1
Greaves, M.2
Holmback, H.3
Karygiannis, T.4
Jansen, W.5
Silverman, B.G.6
Suri, N.7
Wong, A.8
-
54
-
-
0036870378
-
Building trustworthy software agents
-
A. Patrick, Building Trustworthy Software Agents, IEEE Internet Computing, vol. 6, no. 6, 2002.
-
(2002)
IEEE Internet Computing
, vol.6
, Issue.6
-
-
Patrick, A.1
-
55
-
-
0035023691
-
Dynamic configuration of access control for mobile components in fargo
-
Y. Gidron, I. Ben-Shaul, O. Holder, and Y. Aridor, Dynamic Configuration of Access Control for Mobile Components in FarGo, Concurrency and Computation: Practice and Experience, vol. 13, no. 1, 2001.
-
(2001)
Concurrency and Computation: Practice and Experience
, vol.13
, Issue.1
-
-
Gidron, Y.1
Ben-Shaul, I.2
Holder, O.3
Aridor, Y.4
-
56
-
-
0345381606
-
Special issue on policy based networking
-
S. Wright, R. Chadha, and G. Lapiotis, Special Issue on Policy Based Networking, IEEE Network, vol. 16, no. 2, 2002.
-
(2002)
IEEE Network
, vol.16
, Issue.2
-
-
Wright, S.1
Chadha, R.2
Lapiotis, G.3
-
57
-
-
8344253196
-
Making agents acceptable to people
-
Amsterdam: IOS Press
-
J.M. Bradshaw, P. Beautement, L. Bunch, and S.V. Drakunov et al., Making Agents Acceptable to People, Handbook of Intelligent Information Technology, Amsterdam: IOS Press, 2003 (in press).
-
(2003)
Handbook of Intelligent Information Technology
-
-
Bradshaw, J.M.1
Beautement, P.2
Bunch, L.3
Drakunov, S.V.4
-
58
-
-
84944030126
-
Policy-driven management of mobile agent systems
-
New York: Springer-Verlag
-
A. Corradi, N. Dulay, R. Montanari, and C. Stefanelli, Policy-Driven Management of Mobile Agent Systems, International Workshop on Policies for Distributed Systems and Networks — Policy 2001, Lecture Notes in Computer Science, vol. 1995, New York: Springer-Verlag, 2001.
-
(2001)
International Workshop on Policies for Distributed Systems and Networks — Policy 2001, Lecture Notes in Computer Science
, vol.1995
-
-
Corradi, A.1
Dulay, N.2
Montanari, R.3
Stefanelli, C.4
-
59
-
-
0035395667
-
Terraforming cyberspace
-
J.M. Bradshaw, N. Suri, A.J. Canas, R. Davis, K. Ford, R. Hoffman, R. Jeffers, and T. Reichherzer, Terraforming Cyberspace, Computer, vol. 34, no. 7, 2001.
-
(2001)
Computer
, vol.34
, Issue.7
-
-
Bradshaw, J.M.1
Suri, N.2
Canas, A.J.3
Davis, R.4
Ford, K.5
Hoffman, R.6
Jeffers, R.7
Reichherzer, T.8
-
60
-
-
0142156668
-
Cosmos: A context-centric access control middleware for mobile environments
-
5th International Worshop on Mobile Agents for Telecommunication Applications (MATA’03), New York: Springer-Verlag
-
P. Bellavista, R. Montanari, and D. Tibaldi, COSMOS: a Context-Centric Access Control Middleware for Mobile Environments, 5th International Worshop on Mobile Agents for Telecommunication Applications (MATA’03), Lecture Notes in Computer Science, vol. 2881, New York: Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2881
-
-
Bellavista, P.1
Montanari, R.2
Tibaldi, D.3
|