-
1
-
-
0004115867
-
-
Concepts, Standards and Deployment Considerations. Macmillan Technical Publishing
-
C. Adams and S. Lyold. Understanding Public Key Infrastructure: Concepts, Standards and Deployment Considerations. Macmillan Technical Publishing, 1999.
-
(1999)
Understanding Public Key Infrastructure
-
-
Adams, C.1
Lyold, S.2
-
2
-
-
0002380598
-
Security Issues in Mobile Code Systems
-
Springer-Verlag
-
D. M. Chess. Security Issues in Mobile Code Systems. In Mobile Agents and Security, number 1419 in LNCS. Springer-Verlag, 1998.
-
(1998)
Mobile Agents and Security
, vol.1419
-
-
Chess, D.M.1
-
4
-
-
35048848436
-
Security for mobile agents: Issues and requirements
-
Special Issue on Advances in Research and Application of Network Security, October
-
W. Farmer, J. Guttman, and V. Swarup. Security for mobile agents: Issues and requirements. In Computer Communications, Special Issue on Advances in Research and Application of Network Security, October 1996.
-
(1996)
Computer Communications
-
-
Farmer, W.1
Guttman, J.2
Swarup, V.3
-
7
-
-
0001943763
-
Time limited blackbox security: Protecting mobile agents from malicious hosts
-
F. Hohl. Time limited blackbox security: Protecting mobile agents from malicious hosts. In Mobile Agents and Security, number 1419 in LNCS. Springer-Verlag, 1998.
-
(1998)
Mobile Agents and Security
-
-
Hohl, F.1
-
8
-
-
0034315517
-
Countermeasures for Mobile Agent Security
-
Special Issue on Advances in Research and Application of Network Security, November
-
W. Jansen. Countermeasures for Mobile Agent Security. In Computer Communications, Special Issue on Advances in Research and Application of Network Security, November 2000.
-
(2000)
Computer Communications
-
-
Jansen, W.1
-
10
-
-
0026684778
-
Authentication in distributed systems: Theory and practice
-
November
-
B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems, 10(4), November 1992.
-
(1992)
ACM Transactions on Computer Systems
, vol.10
, Issue.4
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
13
-
-
0032665338
-
Security issues related to mobile code and agent-based systems
-
July
-
R. Oppliger. Security issues related to mobile code and agent-based systems. Computer Communications, 22(12), July 1999.
-
(1999)
Computer Communications
, vol.22
, Issue.12
-
-
Oppliger, R.1
-
14
-
-
0003197918
-
Protecting mobile agents against malicious hosts
-
Springer-Verlag
-
T. Sander and C. F. Tschudin. Protecting mobile agents against malicious hosts. In Mobile Agents and Security, number 1419 in LNCS. Springer-Verlag, 1998.
-
(1998)
Mobile Agents and Security
, vol.1419
-
-
Sander, T.1
Tschudin, C.F.2
-
17
-
-
0002717089
-
Cryptographic traces for mobile agents
-
Springer-Verlag
-
G. Vigna. Cryptographic traces for mobile agents. In Mobile Agents and Security, number 1419 in LNCS. Springer-Verlag, 1998.
-
(1998)
Mobile Agents and Security, Number
, vol.1419
-
-
Vigna, G.1
-
18
-
-
0346166969
-
Language Issues in Mobile Program Security
-
Springer-Verlag
-
D. Volpano and G. Smith. Language Issues in Mobile Program Security. In Mobile Agents and Security, number 1419 in LNCS. Springer-Verlag, 1998.
-
(1998)
Mobile Agents and Security
, vol.1419
-
-
Volpano, D.1
Smith, G.2
-
19
-
-
85105238769
-
Efficient software-based fault isolation
-
December
-
R. Wahbe, S. Lucco, T. E. Anderson, and S. L. Graham. Efficient software-based fault isolation. In Proceedings of the 14th ACM Symposium on Operating Systems Principles, pages 203–216, December 1996.
-
(1996)
Proceedings of the 14Th ACM Symposium on Operating Systems Principles
, vol.2240
, pp. 203-216
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T.E.3
Graham, S.L.4
|