-
1
-
-
34247249366
-
Belief revision for AgentS-peak agents
-
the Proc Of Autonomous Agents and Multi Agents Systems
-
Alechina, N., Alechina, R., Habner, J., Jago, M., Logan, B., "Belief revision for AgentS-peak agents". the Proc Of Autonomous Agents and Multi Agents Systems 2006. Hakodate, Japan. ISBN:1-59593-303-4, p1288 - 1290.
-
(2006)
Hakodate, Japan. ISBN:1-59593-303-4
, pp. 1288-1290
-
-
Alechina, N.1
Alechina, R.2
Habner, J.3
Jago, M.4
Logan, B.5
-
2
-
-
84874724444
-
-
Online available at, the AVISPA project homepage
-
"AVISPA Project". Online available at http://www.avispa-project.org. the AVISPA project homepage.
-
"AVISPA., Project".
-
-
-
5
-
-
0029392001
-
-
IEEE Personal Communications, October
-
Chess, D., Grosof, B., Harrison, C., Levine, D., Parris, C., and Tsudik, G. "Itinerant Agents for Mobile Computing". IEEE Personal Communications, October, vol.2, no.5, 1995, pp 34-49.
-
(1995)
Itinerant Agents for Mobile Computing
, vol.2
, Issue.5
, pp. 34-49
-
-
Chess, D.1
Grosof, B.2
Harrison, C.3
Levine, D.4
Parris, C.5
Tsudik, G.6
-
6
-
-
77953486754
-
Aglets: Enabling the Virtual Enterprise"
-
the Proc. Of Managing Enterprises Stakeholders, Engineering, Logistics and Achievement ME-SELA'97,ISBN 1, 86058 066
-
Clements, P., Papaioannou, T., Edwards, J., "Aglets: Enabling the Virtual Enterprise". the Proc. Of Managing Enterprises Stakeholders, Engineering, Logistics and Achievement (ME-SELA'97) ISBN 1 86058 066 1, p425.
-
, vol.1
, pp. 425
-
-
Clements, P.1
Papaioannou, T.2
Edwards, J.3
-
7
-
-
1642319729
-
-
Proceedings of SAM'03 (Conference on Security and Management), Col. II, Las Vegas, USA, 23-26 June, ISBN1-932415-18-1. Ed. H. R. Arabnia and Y. Mun
-
Coffey, T., Dojen, R. and Flanagan, T., "On Di_erent Approaches to Establish the Se-curity of Cryptographic Protocols", Proceedings of SAM'03 (Conference on Security and Management), Col. II, Las Vegas, USA, 23-26 June 2003, Pages 637-643, ISBN1-932415-18-1. Ed. H.R.Arabnia and Y. Mun.
-
(2003)
On Di_erent Approaches to Establish the Se-curity of Cryptographic Protocols
, pp. 637-643
-
-
Coffey, T.1
Dojen, R.2
Flanagan, T.3
-
12
-
-
0039158307
-
-
General Magic Inc, online available at
-
General Magic, Inc. "The Telescript Language Reference", online available at http://www.genmagic.com-Telescript.
-
The Telescript Language Reference
-
-
-
15
-
-
77953494915
-
Infrastructure for Proof-Referencing Code
-
Proceedings, Workshop on Foundations of Secure Mobile Code, March
-
Gunter C. A., Homeier P., Nettles S. "Infrastructure for Proof-Referencing Code". Proceedings, Workshop on Foundations of Secure Mobile Code, March 1997.
-
(1997)
-
-
Gunter, C.A.1
Homeier, P.2
Nettles, S.3
-
17
-
-
0025849585
-
How to Time-Stamp a Digital Document"
-
Haber, S., and Stornetta, S. "How to Time-Stamp a Digital Document", Journal of Cryptology, vol. 3, pp. 99-111, 1991.
-
(1991)
Journal of Cryptology
, vol.3
, pp. 99-111
-
-
Haber, S.1
Stornetta, S.2
-
18
-
-
0001943763
-
-
G. Vigna (Ed.), Mobile Agents and Security. Springer-Verlag, LNCS No
-
Hohl, F. "Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts". G. Vigna (Ed.), Mobile Agents and Security. Springer-Verlag, LNCS No 1419, pp 92-113, 1998.
-
(1998)
Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts
, vol.1419
, pp. 92-113
-
-
Hohl, F.1
-
19
-
-
33750948386
-
-
Published in Proceecings of International Conference on Advanced Communication Technology (ICACT), IEEE Communication Society. "JADE". Online available at
-
Hussain, M., Seret, D., "A Comparative study of Security Protocols Validation Tools: HER-MES vs. AVISPA". Published in Proceecings of International Conference on Advanced Communication Technology (ICACT) 2006. IEEE Communication Society. "JADE". Online available at http://jade.tilab.com/.
-
(2006)
"A Comparative study of Security Protocols Validation Tools: HER-MES vs. AVISPA".
-
-
Hussain, M.1
Seret, D.2
-
21
-
-
77953521373
-
-
Online available at
-
"JAVACT project". Online available at http://www.irit.fr/recherches/ISPR/IAM/JavAct.html.
-
JAVACT project
-
-
-
22
-
-
77953521654
-
AIK Java Crytology
-
"AIK Java Crytology", 2001, http://jcewww.iaik.at/. "Java Secure Socket Extension (JSSE) Reference Guide", http:// java.sun.com/ j2se/1.4.2/ docs/ guide/ security/jsse/JSSERefGuide.html.
-
-
-
-
24
-
-
0019634370
-
Pasword authentication with insecure communication
-
Communications ACM, NY, USA. ACM Press, vol.24
-
Maña, A. "Software Protection based on smartcards". PhD Thesis. University of Mlaga. 2003.
-
(1981)
, pp. 770-720
-
-
Lamport, L.1
-
26
-
-
77953504293
-
A Hardware based Infrastructure for Agent Protection
-
th October, 2008, Advances in Soft Computing, Springer Verlag, Vol. 51, Corchado, Juan, M., Tapia, Dante, Bravo, Jose, (Eds., ), illus., SoftcoverISBN: 978-3-540-85866-9
-
th October, 2008. Advances in Soft Computing, Springer Verlag , Vol. 51 Corchado, Juan M.; Tapia, Dante; Bravo, Jose (Eds.). 2009, XII, 354 p. 131 illus., SoftcoverISBN: 978-3-540-85866-9.
-
(2009)
, vol.12
, Issue.354
, pp. 131
-
-
Maña, A.1
Muñoz, A.2
-
27
-
-
77953517177
-
Towards Secure Agent Computing for Ubiquitous Computing and Ambient Intelligence
-
th UIC. Published bySpringer-Verlag. LNCS, ISSN
-
th UIC. Published bySpringer-Verlag. LNCS, ISSN, 0302-9743.
-
-
-
Maña, A.1
Muñoz, A.2
Serrano, D.3
-
28
-
-
70349665527
-
SecMiLiA: An Approach in the Agent Protection
-
the proceedings of the International Conference on Availability, Reliability and Security, ARES, published by IEEE Computer Society Press
-
Muñoz, A., Maña, A., Serrano, D. "SecMiLiA: An Approach in the Agent Protection". the proceedings of the International Conference on Availability, Reliability and Security, ARES 2009, published by IEEE Computer Society Press.
-
(2009)
-
-
Muñoz, A.1
Maña, A.2
Serrano, D.3
-
29
-
-
77953506900
-
-
AAMAS'05 July, Utrecht, Netherlands
-
Mouratidis H, Kolp M, Faulkner S, Giorgini P,. "A Secure Architectural Description Language for Agent Systems". AAMAS'05 July 25-29, Utrecht, Netherlands.
-
A Secure Architectural Description Language for Agent Systems
, pp. 25-29
-
-
Mouratidis, H.1
Kolp, M.2
Faulkner, S.3
Giorgini, P.4
-
30
-
-
0030685617
-
Proof-Carrying Code
-
th Annual Symposium on Principles of Programming Languages
-
th Annual Symposium on Principles of Programming Languages. 1997.
-
(1997)
-
-
Necula, G.1
-
31
-
-
0029717330
-
-
Proceedings of the First Conference on Emerging Technologies and Applications in Communications, Portland, Oregon, May
-
Ordille, J. "When agents Roam, Who can You Trust?". Proceedings of the First Conference on Emerging Technologies and Applications in Communications, Portland, Oregon, May 1996.
-
(1996)
When agents Roam, Who can You Trust?
-
-
Ordille, J.1
-
32
-
-
0032028340
-
-
IEEE Computer, March
-
st Century". IEEE Computer, March, 1998, pp 23-30.
-
(1998)
st Century
, pp. 23-30
-
-
Ousterhout, J.1
-
34
-
-
0342432744
-
-
G.Vigna (Ed). Mobile Agents and Security, Springer-Verlag, LNCS No
-
Riordan, J., and Scheneider, B. "Environmental Key Generation Towards Clueless Agents". G.Vigna (Ed). Mobile Agents and Security, Springer-Verlag, LNCS No 1419, 1998.
-
(1998)
Environmental Key Generation Towards Clueless Agents
, vol.1419
-
-
Riordan, J.1
Scheneider, B.2
-
36
-
-
77953498068
-
Protecting Mobile Agents Against Malicious Hosts
-
G. Vigna (Ed.), LNCS, No.S225 711, August
-
Sander, T., and Tschudin, C. "Protecting Mobile Agents Against Malicious Hosts", G. Vigna (Ed.), Mobile Agents and Security. Springer-Verlag, LNCS No. S225 711, August 1983.
-
(1983)
Mobile Agents and Security. Springer-Verlag
, vol.711
-
-
Sander, T.1
Tschudin, C.2
-
38
-
-
77953503701
-
Enhancing Performance of Cooperating Agents in Real-Time Diagnostic Systems
-
Proceedings of the Thirteenth International Joint Conference on Arti_cial Intelligence (IJCAI-93), 332337
-
Schwuttke, U. M., and Quan, A. G. 1993. "Enhancing Performance of Cooperating Agents in Real-Time Diagnostic Systems". Proceedings of the Thirteenth International Joint Conference on Arti_cial Intelligence (IJCAI-93), 332337. Menlo Park, Calif.: International Joint Conferences on Arti_cial Intelligence.
-
(1993)
Menlo Park, Calif.: International Joint Conferences on Arti_cial Intelligence
-
-
Schwuttke, U.M.1
Quan, A.G.2
-
39
-
-
70449678535
-
The JACK Usage Report
-
the Proc Of. Autonomous Agents and Multi Agents Systems, (AAMAS 03)
-
Shepherdson, D., "The JACK Usage Report". the Proc Of. Autonomous Agents and Multi Agents Systems, (AAMAS 03) 2003 .
-
(2003)
-
-
Shepherdson, D.1
-
40
-
-
0025505149
-
-
ACM Transactions on Programming Languages and Systems (TOPLAS) archive, ISSN:0164-0925
-
Stamos, J., and Gi_ord, D. "Remote Evaluation". ACM Transactions on Programming Languages and Systems (TOPLAS) archive, ISSN:0164-0925. Vol, Issue 4. 1990. pp 537 - 564.
-
(1990)
Remote Evaluation
, vol.4
, Issue.4
, pp. 537-564
-
-
Stamos, J.1
Gifford, D.2
-
41
-
-
84947921326
-
Robust Object Watermarking: Ap-plication to Code"
-
Proceedings of Info Hiding '99, Springer-Verlag. LNCS 1768
-
Stern, J. P., Hachez, G., Koeune, F., Quisquater, J. J. "Robust Object Watermarking: Ap-plication to Code". Proceedings of Info Hiding '99, Springer-Verlag. LNCS 1768, pp. 368-378, 1999. http://www.dice.ucl.ac.be/crypto/publications/1999/codemark.pdf.
-
(1999)
, pp. 368-378
-
-
Stern, J.P.1
Hachez, G.2
Koeune, F.3
Quisquater, J.J.4
-
42
-
-
77953483173
-
-
Trusted Computing Group
-
. Trusted Computing Group. "TCG TPM Speci_cation Version 1.2". I-III, 2005.
-
(2005)
TCG TPM Speci_cation Version 1.2
, pp. 1-3
-
-
-
46
-
-
0027836576
-
-
Proceedings of the Fourteenth ACM Symposium on Operating Systmes Principles. ACM SIGOPS Operating Systems Review, Dec
-
Wahbe, R., Lucco, S., Anderson, T. "Efficent Software-Based Isolation". Proceedings of the Fourteenth ACM Symposium on Operating Systmes Principles. ACM SIGOPS Operating Systems Review, pp 203-216. Dec 1993.
-
(1993)
Efficent Software-Based Isolation
, pp. 203-216
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T.3
-
48
-
-
0031074051
-
Agent-based Software Engineering
-
February
-
Wooldrigde, M. "Agent-based Software Engineering". IEE Proceedings on Software Engineering, 144(1), pages 26-37, February 1997.
-
(1997)
IEE Proceedings on Software Engineering
, vol.144
, Issue.1
, pp. 26-37
-
-
Wooldrigde, M.1
-
49
-
-
0004077062
-
-
Technical Report CS97-537, University of California in San Diego, April, Online available at
-
Yee, B. "A Sanctuary for Mobile Agents", Technical Report CS97-537, University of California in San Diego, April 28, 1997. Online available at http://www-cse.ucsd.edu/users/bsy/index.html.
-
(1997)
A Sanctuary for Mobile Agents
, vol.28
-
-
Yee, B.1
|