-
1
-
-
0003906677
-
-
Technical report, IBM Research Report, IBM Research Division, T. J. Watson Research Center, Yorktown Heights, NY, March
-
C. G. Harrison, D. M. Chess, and A. Kershenbaum. Mobile agents: Are they a good idea Technical report, IBM Research Report, IBM Research Division, T. J. Watson Research Center, Yorktown Heights, NY, March 1995. http: //www. research. i bm. com/massive.
-
(1995)
Mobile Agents: Are They A Good Idea
-
-
Harrison, C.G.1
Chess, D.M.2
Kershenbaum, A.3
-
2
-
-
84949751564
-
Security for mobile agents: Authentication and state appraisal
-
Rome, Italy, September. Springer-Verlag Lecture Notes in Computer Science
-
William M. Farmer, Joshua D. Guttman, and Vipin Swarup. Security for mobile agents: Authentication and state appraisal. In Proceedings of the Fourth European Symposium on Research in Computer Security, pages 118-130, Rome, Italy, September 1996. Springer-Verlag Lecture Notes in Computer Science No. 1146.
-
(1996)
Proceedings of the Fourth European Symposium on Research in Computer Security
, Issue.1146
, pp. 118-130
-
-
Farmer, W.M.1
Guttman, J.D.2
Swarup, V.3
-
3
-
-
0004113252
-
Network management by delegation
-
Washington, DC, April
-
Y. Yemini, G. Goldszmit, S. Yemini, Network Management by Delegation. Proceedings of the 2nd Int. Symp. On Integrated Network Management, pp. 95-97, Washington, DC, April, 1991.
-
(1991)
Proceedings of the 2nd Int. Symp. on Integrated Network Management
, pp. 95-97
-
-
Yemini, Y.1
Goldszmit, G.2
Yemini, S.3
-
4
-
-
0002147102
-
Decentralizing control and intelligence in network management
-
Santa Barbara, CA, May
-
K. Meyer, M. Erlinger, J. Betser, C. Sunshine, G. Goldsmidt, Y. Yemini, Decentralizing Control and Intelligence in Network Management. Proceedings of the 4th Int. Symp. On Integrated Network Management, Santa Barbara, CA, May 1995.
-
(1995)
Proceedings of the 4th Int. Symp. on Integrated Network Management
-
-
Meyer, K.1
Erlinger, M.2
Betser, J.3
Sunshine, C.4
Goldsmidt, G.5
Yemini, Y.6
-
5
-
-
0031163652
-
Delegation agent implementation for network management
-
M. Suzuki, Y. Kihira, S. Nakai, Delegation Agent Implementation for Network Management. IEICE Transactions on Communications, 1997, V. 80, No. 6, pp. 900-907.
-
(1997)
IEICE Transactions on Communications
, vol.80
, Issue.6
, pp. 900-907
-
-
Suzuki, M.1
Kihira, Y.2
Nakai, S.3
-
7
-
-
84947914091
-
VINES: Distributed algorithms for a web-based distributed network management system
-
12-16 May, San Diego, G. Hjalmtysson, A. Jain, Agent-Based Approach to Service Management-Towards CA
-
G. Mansfield, E. P. Duarte Jr., M. Kitahashi, S. Noguchi, VINES: Distributed Algorithms for a Web-Based Distributed Network Management System. Proceedings of the 5th Int. Symp. On Integrated Network Management, 12-16 May 1997, San Diego, G. Hjalmtysson, A. Jain, Agent-Based Approach to Service Management-Towards CA, pp. 28 1-294.
-
(1997)
Proceedings of the 5th Int. Symp. on Integrated Network Management
, pp. 281-294
-
-
Mansfield, G.1
Duarte, E.P.2
Kitahashi, M.3
Noguchi, S.4
-
11
-
-
85037544256
-
-
Agent Tools List http: //www. Agentbuilder. com/AgentTools/
-
Agent Tools List
-
-
-
12
-
-
85037528272
-
-
Joseph Kiniry and Daniel Zimmerman. Addendum to A Hands-on Look at Java IEEE Internet Computing, July-August
-
Joseph Kinky and Daniel Zimmman. A Hands-on Look at Java Mobile Agents. Joseph Kiniry and Daniel Zimmerman. Addendum to "A Hands-on Look at Java IEEE Internet Computing, July-August, 1997.
-
(1997)
A Hands-on Look at Java Mobile Agents
-
-
Kinky, J.1
Zimmman, D.2
-
15
-
-
85037546845
-
-
IBM Aglets http: //www. meitca. com/HSWProjectdConcordiflelcome. h tml
-
IBM Aglets http: //www. Trl. ibm. co. jp/aglets/ 1171 Concordia http: //www. meitca. com/HSWProjectdConcordiflelcome. h tml
-
-
-
-
16
-
-
84877512678
-
-
General Magic http: //www. genmagic. com/technology/mobile-agenth. T ml
-
General Magic
-
-
-
17
-
-
0031599765
-
Security and reliability in concordia
-
January 6-9, Hawaii
-
Tom Walsh, Noemi Paciorek, David Wong. Security and Reliability in Concordia, Hawaii International Conference on Software Systems, HICSS 3 1, January 6-9, 1998, Hawaii.
-
(1998)
Hawaii International Conference on Software Systems, HICSS 3 1
-
-
Walsh, T.1
Paciorek, N.2
Wong, D.3
-
18
-
-
85037525054
-
-
July-August
-
IEEE Internet Computing, July-August, 1997, http: //computer. orglinternet
-
(1997)
IEEE Internet Computing
-
-
-
19
-
-
85037525054
-
-
September-October
-
IEEE Internet Computing, September-October, 1997, http: //computer. org/intemet
-
(1997)
IEEE Internet Computing
-
-
-
21
-
-
85037540847
-
-
Java RMI http: //java. sun. com: 80/products/jdk/rmi/index. html
-
Java RMI
-
-
-
22
-
-
85037540265
-
-
Java Reflection Broker http: //andromeda. cseIt. it/users/g/grasso/free. htm
-
Java Reflection Broker
-
-
-
23
-
-
85037540310
-
-
Phaos SSLava http: //www. phaos. com /main. htm
-
Phaos SSLava
-
-
-
24
-
-
85037539735
-
-
Java Security1 http: //java. sun. com/marketing/collateral/security. html
-
Java Security1
-
-
-
25
-
-
85037538650
-
A security model for aglets
-
Zahir Tari and Shun-Wu Chan, Larry Korba. Securing Wireless LAN Access: A Network Management Approach
-
Gunter Karjoth, Danny B. Lange, and Mitsuru Oshima. A Security Model for Aglets, Zahir Tari and Shun-Wu Chan. A Role-Based Access Control for Intranet Security, Larry Korba. Securing Wireless LAN Access: A Network Management Approach.
-
A Role-Based Access Control for Intranet Security
-
-
Karjoth, G.1
Lange, D.B.2
Oshima, M.3
-
27
-
-
85037543980
-
-
Scott Oaks, Java Security, Tom Mowbray. The Essential COMA, John Wiley & Sons
-
Scott Oaks, Java Security. O'Reilly h Associates. Tom Mowbray. The Essential COMA, John Wiley & Sons, 1995.
-
(1995)
O'Reilly H Associates
-
-
|