메뉴 건너뛰기




Volumn , Issue , 1999, Pages 715-728

Towards securing network management agent distribution and communication

Author keywords

Authentication; Distributed System; Mobile Agent; Network Management; Security; Software Agent

Indexed keywords

APPLICATION PROGRAMS; AUTHENTICATION; COMPUTER PROGRAMMING; COMPUTER SOFTWARE; JAVA PROGRAMMING LANGUAGE; MOBILE AGENTS; NETWORK MANAGEMENT; PEER TO PEER NETWORKS; SOFTWARE AGENTS;

EID: 84937443540     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INM.1999.770718     Document Type: Conference Paper
Times cited : (1)

References (28)
  • 1
    • 0003906677 scopus 로고
    • Technical report, IBM Research Report, IBM Research Division, T. J. Watson Research Center, Yorktown Heights, NY, March
    • C. G. Harrison, D. M. Chess, and A. Kershenbaum. Mobile agents: Are they a good idea Technical report, IBM Research Report, IBM Research Division, T. J. Watson Research Center, Yorktown Heights, NY, March 1995. http: //www. research. i bm. com/massive.
    • (1995) Mobile Agents: Are They A Good Idea
    • Harrison, C.G.1    Chess, D.M.2    Kershenbaum, A.3
  • 2
    • 84949751564 scopus 로고    scopus 로고
    • Security for mobile agents: Authentication and state appraisal
    • Rome, Italy, September. Springer-Verlag Lecture Notes in Computer Science
    • William M. Farmer, Joshua D. Guttman, and Vipin Swarup. Security for mobile agents: Authentication and state appraisal. In Proceedings of the Fourth European Symposium on Research in Computer Security, pages 118-130, Rome, Italy, September 1996. Springer-Verlag Lecture Notes in Computer Science No. 1146.
    • (1996) Proceedings of the Fourth European Symposium on Research in Computer Security , Issue.1146 , pp. 118-130
    • Farmer, W.M.1    Guttman, J.D.2    Swarup, V.3
  • 5
    • 0031163652 scopus 로고    scopus 로고
    • Delegation agent implementation for network management
    • M. Suzuki, Y. Kihira, S. Nakai, Delegation Agent Implementation for Network Management. IEICE Transactions on Communications, 1997, V. 80, No. 6, pp. 900-907.
    • (1997) IEICE Transactions on Communications , vol.80 , Issue.6 , pp. 900-907
    • Suzuki, M.1    Kihira, Y.2    Nakai, S.3
  • 7
    • 84947914091 scopus 로고    scopus 로고
    • VINES: Distributed algorithms for a web-based distributed network management system
    • 12-16 May, San Diego, G. Hjalmtysson, A. Jain, Agent-Based Approach to Service Management-Towards CA
    • G. Mansfield, E. P. Duarte Jr., M. Kitahashi, S. Noguchi, VINES: Distributed Algorithms for a Web-Based Distributed Network Management System. Proceedings of the 5th Int. Symp. On Integrated Network Management, 12-16 May 1997, San Diego, G. Hjalmtysson, A. Jain, Agent-Based Approach to Service Management-Towards CA, pp. 28 1-294.
    • (1997) Proceedings of the 5th Int. Symp. on Integrated Network Management , pp. 281-294
    • Mansfield, G.1    Duarte, E.P.2    Kitahashi, M.3    Noguchi, S.4
  • 11
    • 85037544256 scopus 로고    scopus 로고
    • Agent Tools List http: //www. Agentbuilder. com/AgentTools/
    • Agent Tools List
  • 12
    • 85037528272 scopus 로고    scopus 로고
    • Joseph Kiniry and Daniel Zimmerman. Addendum to A Hands-on Look at Java IEEE Internet Computing, July-August
    • Joseph Kinky and Daniel Zimmman. A Hands-on Look at Java Mobile Agents. Joseph Kiniry and Daniel Zimmerman. Addendum to "A Hands-on Look at Java IEEE Internet Computing, July-August, 1997.
    • (1997) A Hands-on Look at Java Mobile Agents
    • Kinky, J.1    Zimmman, D.2
  • 15
    • 85037546845 scopus 로고    scopus 로고
    • IBM Aglets http: //www. meitca. com/HSWProjectdConcordiflelcome. h tml
    • IBM Aglets http: //www. Trl. ibm. co. jp/aglets/ 1171 Concordia http: //www. meitca. com/HSWProjectdConcordiflelcome. h tml
  • 16
    • 84877512678 scopus 로고    scopus 로고
    • General Magic http: //www. genmagic. com/technology/mobile-agenth. T ml
    • General Magic
  • 18
    • 85037525054 scopus 로고    scopus 로고
    • July-August
    • IEEE Internet Computing, July-August, 1997, http: //computer. orglinternet
    • (1997) IEEE Internet Computing
  • 19
    • 85037525054 scopus 로고    scopus 로고
    • September-October
    • IEEE Internet Computing, September-October, 1997, http: //computer. org/intemet
    • (1997) IEEE Internet Computing
  • 21
    • 85037540847 scopus 로고    scopus 로고
    • Java RMI http: //java. sun. com: 80/products/jdk/rmi/index. html
    • Java RMI
  • 22
  • 23
    • 85037540310 scopus 로고    scopus 로고
    • Phaos SSLava http: //www. phaos. com /main. htm
    • Phaos SSLava
  • 24
    • 85037539735 scopus 로고    scopus 로고
    • Java Security1 http: //java. sun. com/marketing/collateral/security. html
    • Java Security1
  • 25
    • 85037538650 scopus 로고    scopus 로고
    • A security model for aglets
    • Zahir Tari and Shun-Wu Chan, Larry Korba. Securing Wireless LAN Access: A Network Management Approach
    • Gunter Karjoth, Danny B. Lange, and Mitsuru Oshima. A Security Model for Aglets, Zahir Tari and Shun-Wu Chan. A Role-Based Access Control for Intranet Security, Larry Korba. Securing Wireless LAN Access: A Network Management Approach.
    • A Role-Based Access Control for Intranet Security
    • Karjoth, G.1    Lange, D.B.2    Oshima, M.3
  • 27
    • 85037543980 scopus 로고
    • Scott Oaks, Java Security, Tom Mowbray. The Essential COMA, John Wiley & Sons
    • Scott Oaks, Java Security. O'Reilly h Associates. Tom Mowbray. The Essential COMA, John Wiley & Sons, 1995.
    • (1995) O'Reilly H Associates


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.