메뉴 건너뛰기




Volumn 3, Issue 2, 2008, Pages 1-21

A secure mobile agents platform

Author keywords

Access control; Authentication; Mobile agents; Security

Indexed keywords

ACCESS CONTROL; AUTHENTICATION; DISTRIBUTED COMPUTER SYSTEMS;

EID: 77956183594     PISSN: 17962021     EISSN: None     Source Type: Journal    
DOI: 10.4304/jcm.3.2.1-12     Document Type: Article
Times cited : (18)

References (36)
  • 2
    • 34548161907 scopus 로고    scopus 로고
    • Mobile Agent Facility Specification
    • August, URL
    • International Business Machines Corporation: "Mobile Agent Facility Specification". OMG TC Document cf/96-08-01, August 1996. URL: http://www.trl.ibm.co.jp/aglets/maf.ps
    • (1996) OMG TC Document cf/96-08-01
  • 7
    • 78651532362 scopus 로고    scopus 로고
    • Capability Based Protection for Hosting Mobile Code
    • March 17-21
    • Christian Jensen and Leila Ismail. "Capability Based Protection for Hosting Mobile Code". In ERSADS'97, March 17-21, 1997.
    • (1997) ERSADS'97
    • Jensen, C.1    Ismail, L.2
  • 10
    • 46749100550 scopus 로고    scopus 로고
    • Leila Ismail. 'Evaluation of Authentication Mechanisms for Mobile Agents on top of Java. icis, pp. 663-668, 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007
    • Leila Ismail. 'Evaluation of Authentication Mechanisms for Mobile Agents on top of Java". icis, pp. 663-668, 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007
  • 11
    • 35048865790 scopus 로고    scopus 로고
    • A Two-Leveled Mobile Agent System for E-commerce with Constraint-Based Filtering
    • Springer Berlin/Heidelberg. ISBN: 978-3-540-22114-2
    • Ozgur Koray Sahingoz and Nadia Erdogan. "A Two-Leveled Mobile Agent System for E-commerce with Constraint-Based Filtering". Lecture Notes in Computer Science. Springer Berlin/Heidelberg. Vol.3036/2004, ISBN: 978-3-540-22114-2, 2004
    • (2004) Lecture Notes in Computer Science , vol.3036
    • Koray Sahingoz, O.1    Erdogan, N.2
  • 15
    • 46149151346 scopus 로고    scopus 로고
    • Programming and Deployimg Java Mobile Agents with Aglets
    • August
    • D. Lange and O. Mitasuru. "Programming and Deployimg Java Mobile Agents with Aglets. Addison-Wesley Pub Co, ISBM: 0-201-32582-9, August 1998
    • (1998) Addison-Wesley Pub Co, ISBM
    • Lange, D.1    Mitasuru, O.2
  • 17
    • 0000368626 scopus 로고    scopus 로고
    • Mole, Concepts of a MobileAgents System
    • J. Baiumann, F. Hohl, K. Rothermel, and M. Straer. "Mole, Concepts of a MobileAgents System". World Wide Web, vol. 1, No. 3, pp. 123-137, 1998.
    • (1998) World Wide Web , vol.1 , Issue.3 , pp. 123-137
    • Baiumann, J.1    Hohl, F.2    Rothermel, K.3    Straer, M.4
  • 19
    • 84947944550 scopus 로고    scopus 로고
    • Object Space Voyager - The Agent ORB for Java
    • G. Glass. "Object Space Voyager - The Agent ORB for Java". Lecture Notes in Computer Science, n. 1368, pp. 38-55, 1998.
    • (1998) Lecture Notes in Computer Science , Issue.1368 , pp. 38-55
    • Glass, G.1
  • 20
    • 33646594936 scopus 로고    scopus 로고
    • JADE Board, February, 2004
    • JADE Board. "JADE Security Guide". February, 2004. http:// jade.tilab.com/
    • JADE Security Guide
  • 24
    • 84867313902 scopus 로고    scopus 로고
    • Protecting the computation results of free-roaming agents
    • Second International Workshop on Mobile Agents MN98, Springer-Verlag
    • G. Karjoth, N. Asokan, and C. Glc. "Protecting the computation results of free-roaming agents", Second International Workshop on Mobile Agents (MN98), Lecture Notes in Computer Science 1477, pages 195-207. Springer-Verlag, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1477 , pp. 195-207
    • Karjoth, G.1    Asokan, N.2    Glc, C.3
  • 25
    • 84974577749 scopus 로고    scopus 로고
    • One-Round Secure Computation and Secure Autonomous Mobile Agents
    • Proc. 27th Colloquium on Automata, Languages and Programming ICALP, Geneva, Springer-Verlag
    • C. Cachin, J. Camenisch, J. Kilian, and J. Mller. One-Round Secure Computation and Secure Autonomous Mobile Agents. In Proc. 27th Colloquium on Automata, Languages and Programming (ICALP), Geneva, Lecture Notes in Computer Science, Springer-Verlag, 2000
    • (2000) Lecture Notes in Computer Science
    • Cachin, C.1    Camenisch, J.2    Kilian, J.3    Mller, J.4
  • 26
    • 0037362952 scopus 로고    scopus 로고
    • Protecting Mobile Code in Wild
    • March/April
    • John Zachary. "Protecting Mobile Code in Wild". IEEE Computer Society. March/April 2003 (Vol. 7, No. 2) pp 78-82
    • (2003) IEEE Computer Society , vol.7 , Issue.2 , pp. 78-82
    • Zachary, J.1
  • 27
    • 78651535766 scopus 로고    scopus 로고
    • A. Puliafito and O. Tomarchio. Design and development of a practical security model for a mobile agent system. Proceedings of the Seventh International Symposium on Computers and Communications (ISCC02), 02, pp. 1530-1346.
    • A. Puliafito and O. Tomarchio. "Design and development of a practical security model for a mobile agent system". Proceedings of the Seventh International Symposium on Computers and Communications (ISCC02), vol. 02, pp. 1530-1346.
  • 28
    • 0002992633 scopus 로고    scopus 로고
    • D'Agents: Security in a multiple-language, mobile-agent syste
    • Mobile Agents and Security, Giovanni Vigna Editor, Springer Verlag, pp
    • Robert S. Gray, David Kotz, George Cybenko, and Daniela Rus. "D'Agents: Security in a multiple-language, mobile-agent syste". In Mobile Agents and Security, Giovanni Vigna (Editor), Lecture Notes in Computer Science, Springer Verlag, pp. 154-197, 1998
    • (1998) Lecture Notes in Computer Science , pp. 154-197
    • Gray, R.S.1    Kotz, D.2    Cybenko, G.3    Rus, D.4
  • 31
    • 0004198635 scopus 로고    scopus 로고
    • ISBN-10:, ISBN-13: 978-0-13-035548-5. Prentice Hall. Published. 02 December, Upper Saddle River, NJ: Prentice Hall
    • Charles P. Pfleeger and Shari Lawrence Pfleeger. "Security in Computing". ISBN-10: 0-13-035548-8; ISBN-13: 978-0-13-035548-5. Prentice Hall. Published. 02 December 2002. Upper Saddle River, NJ: Prentice Hall
    • (2002) Security in Computing
    • Pfleeger, C.P.1    Lawrence Pfleeger, S.2
  • 32
    • 0001259536 scopus 로고    scopus 로고
    • A Distributed Object Model for the Java System
    • A. Wollrath, R. Riggs, and J. Waldo. "A Distributed Object Model for the Java System". Computing Systems, vol. 9, no. 4, pp. 291-312, 1996.
    • (1996) Computing Systems , vol.9 , Issue.4 , pp. 291-312
    • Wollrath, A.1    Riggs, R.2    Waldo, J.3
  • 33
  • 34
    • 78651536138 scopus 로고    scopus 로고
    • Pankaj Kumar. J2EE Security for Servlets, EJBs, and Web Services. ISBN-10: 0-13-140264-1; ISBN-13: 978-0-13-140264-5; Prentice Hall. Published: 04 September, 2003
    • Pankaj Kumar. "J2EE Security for Servlets, EJBs, and Web Services. ISBN-10: 0-13-140264-1; ISBN-13: 978-0-13-140264-5; Prentice Hall. Published: 04 September, 2003
  • 36
    • 78651591305 scopus 로고    scopus 로고
    • Sun Microsystems. JDK 5.0 Documentation. Sun Microsystems, 2004. URL: http://java.sun.com/j2se/1.5.0/docs
    • Sun Microsystems. "JDK 5.0 Documentation". Sun Microsystems, 2004. URL: http://java.sun.com/j2se/1.5.0/docs


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.