-
1
-
-
0034828870
-
Cryptographic security for mobile code
-
00:0002
-
J. Algesheimer, C. Cachin, J. Camenisch, and G. Karjoth. Cryptographic security for mobile code. Proceedings of the 2001 Symposium of Security and Privacy, 00: 0002, 2001.
-
Proceedings of the 2001 Symposium of Security and Privacy
, pp. 2001
-
-
Algesheimer, J.1
Cachin, C.2
Camenisch, J.3
Karjoth, G.4
-
5
-
-
0003686066
-
An internet attibute certificate profile for authorization
-
IETF, April
-
S. Farrell and R. Housley. An internet attibute certificate profile for authorization. Request for Comment (RFC) 3281, IETF, April 2002.
-
(2002)
Request for Comment (RFC)
, vol.3281
-
-
Farrell, S.1
Housley, R.2
-
6
-
-
0003801299
-
Inside JavaTM 2 platform security
-
Addison Wesley, June
-
L. Gong. Inside JavaTM 2 Platform Security. The JavaTM Series. Addison Wesley, June 1999. ISBN: 0-201-31000-7.
-
(1999)
The JavaTM Series
-
-
Gong, L.1
-
8
-
-
15744404900
-
Cougaar: A scalable, distributed multi-agent architecture
-
A. Helsinger, M. Thome, and T. Wright. Cougaar: A scalable, distributed multi-agent architecture. In IEEE International Conference on Systems, Man and Cybernetics, 2004.
-
(2004)
IEEE International Conference on Systems, Man and Cybernetics
-
-
Helsinger, A.1
Thome, M.2
Wright, T.3
-
10
-
-
0033702826
-
A security architecture for mobile agents in ajanta
-
00: 402
-
N. M. Karnik and A. R. Tripathi. A security architecture for mobile agents in ajanta. ICDCS, 00: 402, 2000.
-
(2000)
ICDCS
-
-
Karnik, N.M.1
Tripathi, A.R.2
-
11
-
-
0042785438
-
Mobile agents and the future of the internet
-
D. Kotz and R. Gray. Mobile Agents and the Future of the Internet. Operating Systems Review, 33(3): 7-13, 1999.
-
(1999)
Operating Systems Review
, vol.33
, Issue.3
, pp. 7-13
-
-
Kotz, D.1
Gray, R.2
-
13
-
-
34548018199
-
WS-Agreement based resource negotiation framework for mobile agents
-
D. G. A. Mobach, B. J. Overeinder, and F. M. T. Brazier. WS-Agreement based resource negotiation framework for mobile agents. Scalable Computing: Practice and Experience, 7(1): 23-36, 2006.
-
(2006)
Scalable Computing: Practice and Experience
, vol.7
, Issue.1
, pp. 23-36
-
-
Mobach, D.G.A.1
Overeinder, B.J.2
Brazier, F.M.T.3
-
14
-
-
33745302802
-
Scalable middleware environment for agent-based internet applications
-
of LNCS, Copenhagen, Denmark Springer
-
B. J. Overeinder and F. M. T. Brazier. Scalable middleware environment for agent-based internet applications. In Proceedings of the Workshop on State-of-The-Art in Scientific Computing (PARA'04), volume 3732 of LNCS, pages 675-679, Copenhagen, Denmark, 2004. Springer.
-
(2004)
Proceedings of the Workshop on State-of-The-Art in Scientific Computing (PARA'04)
, vol.3732
, pp. 675-679
-
-
Overeinder, B.J.1
Brazier, F.M.T.2
-
15
-
-
0242628243
-
Security and trust in agent-oriented middleware
-
R. Meersman and Z. Tari, editors in LNCS, Springer-Verlag, 2003
-
A. Poggi, M. Tomaiuolo, and G. Vitaglione. Security and trust in agent-oriented middleware. In R. Meersman and Z. Tari, editors, OTM Workshops 2003, number 2889 in LNCS, pages 989-1003. Springer-Verlag, 2003.
-
(2003)
OTM Workshops
, Issue.2889
, pp. 989-1003
-
-
Poggi, A.1
Tomaiuolo, M.2
Vitaglione, G.3
-
19
-
-
0030086382
-
Role-based access control models
-
February
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 29(2): 38-47, February 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
21
-
-
50649095121
-
A secure jailing system for confining untrusted applications
-
July
-
G. van 't Noordende, A. Balogh, R. F. H. Hofman, F. M. T. Brazier, and A. S. Tanenbaum. A secure jailing system for confining untrusted applications. In Proc. 2nd International Conference on Security and Cryptography (SECRYPT), pages 414-423, July 2007.
-
(2007)
Proc. 2nd International Conference on Security and Cryptography (SECRYPT)
, pp. 414-423
-
-
Van't Noordende, G.1
Balogh, A.2
Hofman, R.F.H.3
Brazier, F.M.T.4
Tanenbaum, A.S.5
-
23
-
-
85027573976
-
Enforcing integrity of agent migration paths by distribution of trust
-
M. Warnier, M. A. Oey, R. J. Timmer, B. J. Overeinder, and F. M. T. Brazier. Enforcing integrity of agent migration paths by distribution of trust. Int. J. of Intelligent Information and Database Systems, 2008.
-
(2008)
Int. J. of Intelligent Information and Database Systems
-
-
Warnier, M.1
Oey, M.A.2
Timmer, R.J.3
Overeinder, B.J.4
Brazier, F.M.T.5
-
24
-
-
0242540371
-
PDBM: A flexible delegation model in RBAC
-
(S ACMAT 2003), Como, Italy
-
X. Zhang, S. Oh, and R. Sandhu. PDBM: A flexible delegation model in RBAC. In Proceedings of the 7th ACM Symposium on Access Control Models and Technologies (SACMAT 2003), Como, Italy, 2003.
-
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies
, vol.2003
-
-
Zhang, X.1
Oh, S.2
Sandhu, R.3
|