메뉴 건너뛰기




Volumn , Issue , 2001, Pages 435-442

Concepts and architecture of a security-centric mobile agent server

Author keywords

autonomous agents; distributed applications; e commerce; malicious host; mobile agent security

Indexed keywords

AUTONOMOUS AGENTS; COMMERCE; ELECTRONIC COMMERCE; MOBILE COMMERCE; NETWORK ARCHITECTURE; SOFTWARE AGENTS;

EID: 84964039818     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISADS.2001.917449     Document Type: Conference Paper
Times cited : (36)

References (24)
  • 1
  • 2
    • 85014167243 scopus 로고    scopus 로고
    • Seven good reasons for mobile agents
    • March
    • D. B. Lange and M. Oshima, "Seven good reasons for mobile agents," Communications of the ACM, vol. 42, pp. 88-89, March 1999.
    • (1999) Communications of the ACM , vol.42 , pp. 88-89
    • Lange, D.B.1    Oshima, M.2
  • 7
    • 0004035649 scopus 로고    scopus 로고
    • Request for Comments 2246, Internet Engineering Task Force, jan
    • T. Dierks and C. Allen, "The TLS protocol version 1.0," Request for Comments 2246, Internet Engineering Task Force, jan 1999.
    • (1999) The TLS Protocol Version 1.0
    • Dierks, T.1    Allen, C.2
  • 9
    • 0004060893 scopus 로고    scopus 로고
    • Sun Microsystems, Inc. in [23], relative URL: file:/docs/guide/security/spec/security-spec.doc.html
    • L. Gong, Java™ Security Architecture (JDK 1.2). Sun Microsystems, Inc. in [23], relative URL: file:/docs/guide/security/spec/security-spec.doc.html.
    • Java™ Security Architecture (JDK 1.2)
    • Gong, L.1
  • 10
    • 0010915298 scopus 로고
    • Cryptographic message syntax standard
    • RSA Laboratories, Redwood City, CA, USA
    • RSA Laboratories, "Cryptographic message syntax standard," Public Key-Cryptography Standards 7, RSA Laboratories, Redwood City, CA, USA, 1993. Available at URL: ftp://ftp.rsa.com/pub/pkcs/.
    • (1993) Public Key-Cryptography Standards , vol.7
  • 11
    • 18944398258 scopus 로고    scopus 로고
    • Encrypting Java Archives and its Application to Mobile Agent Security
    • Agent Mediated Electronic Commerce: A European Perspective (F. Dignum and C. Sierra, eds.), Berlin: Springer Verlag
    • V. Roth and V. Conan, "Encrypting Java Archives and its Application to Mobile Agent Security," in Agent Mediated Electronic Commerce: A European Perspective (F. Dignum and C. Sierra, eds.), vol. 1991 of Lecture Notes in Artificai Intelligence, pp. 232-244, Berlin: Springer Verlag, 2000.
    • (2000) Lecture Notes in Artificai Intelligence , vol.1991 , pp. 232-244
    • Roth, V.1    Conan, V.2
  • 15
    • 4544338359 scopus 로고    scopus 로고
    • Internet document Version current 11 October
    • F. Hohl, "The mobile agent list." Internet document available at URL http://www.informatik.uni-stuttgart.de/ipvr/vs/projekte/mole/mal/mal.ht%ml. Version current 11 October 1999.
    • (1999) The Mobile Agent List
    • Hohl, F.1
  • 17
    • 0002992633 scopus 로고    scopus 로고
    • D'Agents: Security in a multiple language, mobile-agent system
    • Mobile Agents and Security (G. Vigna, ed.), Berlin Heidelberg: Springer Verlag
    • R. S. Gray, "D'Agents: Security in a multiple language, mobile-agent system," in Mobile Agents and Security (G. Vigna, ed.), vol. 1419 of Lecture Notes in Computer Science, pp. 154-187, Berlin Heidelberg: Springer Verlag, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1419 , pp. 154-187
    • Gray, R.S.1
  • 20
    • 12744271496 scopus 로고    scopus 로고
    • JRes: A resource accounting interface for Java
    • (Vancouver, BC), October
    • G. Gzajkowski and T. von Eicken, "JRes: A resource accounting interface for Java," in Proc. ACM OOPSLA Conference, (Vancouver, BC), October 1998.
    • (1998) Proc. ACM OOPSLA Conference
    • Gzajkowski, G.1    Von Eicken, T.2
  • 24
    • 84937419029 scopus 로고    scopus 로고
    • Mobile Agents (MA'98)
    • Berlin Heidelberg: Springer Verlag, September
    • K. Rothermel and F. Hohl, eds., Mobile Agents (MA'98), vol. 1477 of Lecture Notes in Computer Science. Berlin Heidelberg: Springer Verlag, September 1998.
    • (1998) Lecture Notes in Computer Science , vol.1477
    • Rothermel, K.1    Hohl, F.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.