-
2
-
-
0003802916
-
-
Ph.D. Dissertation, Department of Computer Science, University of Minnesota, Oct
-
N. Karnik, "Security in Mobile Agent systems, " Ph.D. Dissertation, Department of Computer Science, University of Minnesota, Oct. 1998.
-
(1998)
Security in Mobile Agent systems
-
-
Karnik, N.1
-
4
-
-
0003954474
-
-
NIST Special Publication 800-19, National Institute of Standard and Technology
-
W. Jansen and T. Karygiannis, "Mobile Agent Security, " NIST Special Publication 800-19, National Institute of Standard and Technology, 2000.
-
(2000)
Mobile Agent Security
-
-
Jansen, W.1
Karygiannis, T.2
-
7
-
-
0027836576
-
Efficient software-based fault isolation
-
In, Dec
-
R. Wahbe, S. Lucco, T. E. Anderson, and S. L. Graham, "Efficient software-based fault isolation, " In Proceedings of the 14th ACM Symposium on Operating Systems Principles, pages 203-216, Dec. 1993.
-
(1993)
Proceedings of the 14th ACM Symposium on Operating Systems Principles
, pp. 203-216
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T.E.3
Graham, S.L.4
-
10
-
-
0004060893
-
-
Technical Report, Sun Microsystems, Inc., 901 San Antonio Road, Palo Alto, California 94303, U.S. A
-
L. Gong, "Java Security Architecture (JDK1.2), " Technical Report, Sun Microsystems, Inc., 901 San Antonio Road, Palo Alto, California 94303, U.S. A, 1998.
-
(1998)
Java Security Architecture (JDK1.2)
-
-
Gong, L.1
-
11
-
-
0032203850
-
Secure java class loading
-
Li Gong, "Secure java class loading, " IEEE Internet Computing, pages 56-61, 1998.
-
(1998)
IEEE Internet Computing
, pp. 56-61
-
-
Li, G.1
-
12
-
-
0034446927
-
A secure execution framework for Java
-
In, Athens, Greece, Nov
-
M. Hauswirth, C. Kerer, and R. Kurmanowytsch, "A secure execution framework for Java, " In Proceedings of the 7th ACM conference on computer and communications security (CCS 2000), pages 43-52, Athens, Greece, Nov. 2000.
-
(2000)
Proceedings of the 7th ACM conference on computer and communications security (CCS 2000)
, pp. 43-52
-
-
Hauswirth, M.1
Kerer, C.2
Kurmanowytsch, R.3
-
13
-
-
84887507059
-
Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2
-
In, Monterey, California, Dec
-
L. Gong, M. Mueller, H. Prafullchandra, and R. Schemers, "Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2, " In Proceedings of the USENIX Symposium on Internet Technologies and Systems, Monterey, California, Dec. 1997.
-
(1997)
Proceedings of the USENIX Symposium on Internet Technologies and Systems
-
-
Gong, L.1
Mueller, M.2
Prafullchandra, H.3
Schemers, R.4
-
14
-
-
84902459406
-
-
(n.d.). Retrieved December 15, 2003, from James Madison University, IT Technical Services Web site
-
"Signed Code, " (n.d.). Retrieved December 15, 2003, from James Madison University, IT Technical Services Web site: http://www.jmu.edu/computing/info-security/engineering/issues/signedcode.shtml
-
Signed Code
-
-
-
15
-
-
33845291180
-
-
(n.d.). Retrieved December 15, 2003, from Microsoft Corporation, Microsoft Developer Network (MSDN) Web site
-
"Introduction to Code Signing, " (n.d.). Retrieved December 15, 2003, from Microsoft Corporation, Microsoft Developer Network (MSDN) Web site: http://msdn.microsoft.com/library/default.asp?url=/workshop/security/authcode/intro_authenticode.asp
-
Introduction to Code Signing
-
-
-
16
-
-
84902508953
-
-
Gary McGraw and Edward Felten, [Electronic version]. John Wiley and Sons
-
Gary McGraw and Edward Felten (1996-9). Securing JAVA [Electronic version]. John Wiley and Sons, http://www.securingjava.com/
-
(1996)
Securing JAVA
-
-
-
17
-
-
84902508954
-
-
(n.d.)., Retrieved December 21, 2003, from Sun Microsystems, Inc. The JavaTM Tutorial Web site
-
M. Dageforde. (n.d.). "Security Features Overview, " Retrieved December 21, 2003, from Sun Microsystems, Inc. The JavaTM Tutorial Web site: http://java.sun.com /docs/books/tutorial/securityl.2/overview/
-
Security Features Overview
-
-
Dageforde, M.1
-
18
-
-
84902508955
-
-
Retrieved December 21, 2003, from Sun Microsystems, Inc. Sun Developer Network (SDN) Web site
-
R. Levin (1998). "Security Grows Up: The Java 2 Platform, " Retrieved December 21, 2003, from Sun Microsystems, Inc. Sun Developer Network (SDN) Web site: http://java.sun.com/features/1998/ll/jdk.security.html
-
(1998)
Security Grows Up: The Java 2 Platform
-
-
Levin, R.1
-
22
-
-
84860099735
-
-
(n.d.), Retrieved December 28, from Web site
-
P. Lee. (n.d.), "Proof-carrying code, " Retrieved December 28, 2003, from Web site: http://www-2.cs.cmu.edu/~petel/papers/pcc/pcc.html
-
(2003)
Proof-carrying code
-
-
Lee, P.1
-
23
-
-
0034447889
-
A Certifying Compiler for Java
-
Vancouver B. C
-
C. Colby, P. Lee, G. Necula, F. Blau, M. Plesko, and K. Cline, "A Certifying Compiler for Java, " SIGPLAN Conference on Programming Language Design and Implementation. Vancouver B.C., 2000.
-
(2000)
SIGPLAN Conference on Programming Language Design and Implementation
-
-
Colby, C.1
Lee, P.2
Necula, G.3
Blau, F.4
Plesko, M.5
Cline, K.6
-
24
-
-
84902508945
-
-
DARPA Workshop on Foundations for Secure Mobile Code, Monterey, CA, USA, March, Position Paper
-
V. Swarup, "Trust Appraisal and Secure Routing of Mobile Agents, " DARPA Workshop on Foundations for Secure Mobile Code, Monterey, CA, USA, March 1997. Position Paper.
-
(1997)
Trust Appraisal and Secure Routing of Mobile Agents
-
-
Swarup, V.1
-
25
-
-
84949751564
-
Security for mobile agents: Authentication and state appraisal
-
In, Sep
-
W. M. Farmer, J. D. Guttman, and V. Swarup, "Security for mobile agents: Authentication and state appraisal, " In Proceedings of the European Symposium on Research in Computer Security (ESORICS), pages 118-130, Sep. 1996.
-
(1996)
Proceedings of the European Symposium on Research in Computer Security (ESORICS)
, pp. 118-130
-
-
Farmer, W.M.1
Guttman, J.D.2
Swarup, V.3
-
26
-
-
0004004188
-
-
Technical Report, Oct, IBM T.J. Watson Research Center, NY
-
D. Chess, B. Grosof, C. Harrison, D. Levine, C. Parris and G. Tsudik, "Itinerant Agents for Mobile Computing, " Technical Report, Oct. 1995, IBM T.J. Watson Research Center, NY.
-
(1995)
Itinerant Agents for Mobile Computing
-
-
Chess, D.1
Grosof, B.2
Harrison, C.3
Levine, D.4
Parris, C.5
Tsudik, G.6
-
27
-
-
0029717330
-
When Agents Roam, who Can You Trust?
-
Portland, Oregon, May
-
J. J. Ordille, "When Agents Roam, who Can You Trust?, " Proceedings of the First Conference on Emerging Technologies and Applications in Communications, Portland, Oregon, May 1996.
-
(1996)
Proceedings of the First Conference on Emerging Technologies and Applications in Communications
-
-
Ordille, J.J.1
-
31
-
-
0002717089
-
Cryptographic Traces for Mobile Agents
-
in: Giovanni Vigna (Ed.), LNCS 1419, Springer
-
G. Vigna, "Cryptographic Traces for Mobile Agents, " in: Giovanni Vigna (Ed.), Mobile Agent Security, LNCS 1419, 1998, Springer, pages 137-153.
-
(1998)
Mobile Agent Security
, pp. 137-153
-
-
Vigna, G.1
-
32
-
-
26444498136
-
Extending Execution Tracing for Mobile Code Security
-
In K. Fischer and D. Hutter (Eds.), Bologna, Italy.2002
-
H. K. Tan and L. Moreau, "Extending Execution Tracing for Mobile Code Security, " In K. Fischer and D. Hutter (Eds.), Proceedings of Second International Workshop on Security of Mobile Multi Agent Systems (SEMAS'2002), pages 51-59, Bologna, Italy.2002.
-
Proceedings of Second International Workshop on Security of Mobile Multi Agent Systems (SEMAS'2002)
, pp. 51-59
-
-
Tan, H.K.1
Moreau, L.2
-
33
-
-
0036041931
-
Certificates for Mobile Code Security
-
In
-
H. K. Tan, L. Moreau, D. Cruickshank, and D. De Roure, "Certificates for Mobile Code Security, " In Proceedings of The 17th ACM Symposium on Applied Computing (SAC'2002)-Track on Agents, Interactions, Mobility and Systems, pages 76. 2002.
-
(2002)
Proceedings of The 17th ACM Symposium on Applied Computing (SAC'2002)-Track on Agents, Interactions, Mobility and Systems
, pp. 76
-
-
Tan, H.K.1
Moreau, L.2
Cruickshank, D.3
De Roure, D.4
-
34
-
-
0003249402
-
Environmental Key Generation Towards Clueless Agents
-
G. Vinga (Ed.), Springer-Verlag, Lecture Notes in Computer Science No. 1419
-
J. Riordan and B. Schneier, "Environmental Key Generation Towards Clueless Agents, " G. Vinga (Ed.), Mobile Agents and Security, Springer-Verlag, Lecture Notes in Computer Science No. 1419, 1998.
-
(1998)
Mobile Agents and Security
-
-
Riordan, J.1
Schneier, B.2
-
35
-
-
33646884933
-
Apoptosis-the programmed death of distributed services
-
In, [14]
-
C. Tschudin, "Apoptosis-the programmed death of distributed services, " In Secure Internet Programming [14].
-
Secure Internet Programming
-
-
Tschudin, C.1
-
36
-
-
0003197918
-
Protecting Mobile Agents Against Malicious Hosts
-
in G. Vinga (Ed.), SpringerVerlag, Lecture Notes in Computer Science No. 1419
-
T. Sander and C. Tschudin, "Protecting Mobile Agents Against Malicious Hosts, " in G. Vinga (Ed.), Mobile Agents and Security, SpringerVerlag, Lecture Notes in Computer Science No. 1419, 1998.
-
(1998)
Mobile Agents and Security
-
-
Sander, T.1
Tschudin, C.2
-
38
-
-
0025230154
-
Secure circuit evaluation: A protocol based on hiding information from an oracle
-
M. Abadi and J. Feigenbau, "Secure circuit evaluation: a protocol based on hiding information from an oracle, " Journal of Cryptology, vol. 2, 1990.
-
(1990)
Journal of Cryptology
, vol.2
-
-
Abadi, M.1
Feigenbau, J.2
-
39
-
-
14944350676
-
-
Report #03-015, Network Associates Laboratories, June
-
L. D'Anna, B. Matt, A. Reisse, T. Van Vleck, S. Schwab, and P. LeBlanc, "Self-Protecting Mobile Agents Obfuscation Report, " Report #03-015, Network Associates Laboratories, June 2003.
-
(2003)
Self-Protecting Mobile Agents Obfuscation Report
-
-
D'Anna, L.1
Matt, B.2
Reisse, A.3
Van Vleck, T.4
Schwab, S.5
LeBlanc, P.6
-
40
-
-
11144229255
-
-
PhD Dissertation, Wroclaw University of Technology, Institute of Engineering Cybernetics, (under final revision)
-
G. Wroblewski, "General Method of Program Code Obfuscation, " PhD Dissertation, Wroclaw University of Technology, Institute of Engineering Cybernetics, 2002, (under final revision).
-
(2002)
General Method of Program Code Obfuscation
-
-
Wroblewski, G.1
-
42
-
-
79251578513
-
On the (Im)possibility of Obfuscating Programs
-
in, Lecture Notes in Computer Science
-
B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, and K. Yang, "On the (Im)possibility of Obfuscating Programs, " in Advances in Cryptology, Proceedings of Crypto'2001, Lecture Notes in Computer Science, Vol. 2139, pages 1-18.
-
Advances in Cryptology, Proceedings of Crypto'2001
, vol.2139
, pp. 1-18
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.6
Yang, K.7
-
44
-
-
0004046658
-
-
Technical Report 148, Department of Computer Science, University of Auckland, July
-
C. Collberg, C. Thomborson, and D. Low, "A taxonomy of obfuscating transformations, " Technical Report 148, Department of Computer Science, University of Auckland, July 1997.
-
(1997)
A taxonomy of obfuscating transformations
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
45
-
-
18944393179
-
Encryption Tools for Mobile Agents: Sliding Encryption
-
In: E. BIHAM (ed), Lecture Notes in Computer Science, no. 1267. Springer-Verlag, Germany
-
A. Young and M. Yung, "Encryption Tools for Mobile Agents: Sliding Encryption, " In: E. BIHAM (ed), Fast Software Encryption. Lecture Notes in Computer Science, no. 1267. Springer-Verlag, Germany, 1997.
-
(1997)
Fast Software Encryption
-
-
Young, A.1
Yung, M.2
-
46
-
-
0034225108
-
Mobile Agents and Telcos' Nightmares
-
G. Karjoth and J. Posegga, "Mobile Agents and Telcos' Nightmares, " Annales des Télécommυnications Vol. 55, No. 7/8, 29-41, 2000.
-
(2000)
Annales des Télécommυnications
, vol.55
, Issue.7-8
, pp. 29-41
-
-
Karjoth, G.1
Posegga, J.2
-
47
-
-
84902508947
-
-
DARPA Workshop on Foundations for Secure Mobile Code, Feb
-
B. Yee, "A Sanctuary for Mobile Agents, " DARPA Workshop on Foundations for Secure Mobile Code, Feb, 1997.
-
(1997)
A Sanctuary for Mobile Agents
-
-
Yee, B.1
-
48
-
-
84902508948
-
-
Second International Workshop on Mobile Agents, Stuttgart, Germany, Sep
-
G. Karjoth, N. Asokan, and C. Glc, "Protecting the Computation Results of Free-Roaming Agents, " Second International Workshop on Mobile Agents, Stuttgart, Germany, Sep. 1998.
-
(1998)
Protecting the Computation Results of Free-Roaming Agents
-
-
Karjoth, G.1
Asokan, N.2
Glc, C.3
|