-
1
-
-
0003964874
-
-
SRI International Computer Science Laboratory Technical Report SRICSL-95-07
-
Anderson, D., Lunt, Javitz, T. F., Tamaru, H. A. and Valdes, A., “Detecting Unusual Program Behavior Ising the Statistical Component of the Next-Generation Intrusion Detection Expert System (NIDES)”, SRI International Computer Science Laboratory Technical Report SRICSL-95-07, May 1995.
-
(1995)
Detecting Unusual Program Behavior Ising the Statistical Component of the Next-Generation Intrusion Detection Expert System (NIDES)
-
-
Anderson, D.1
Lunt, Javitz, T.F.2
Tamaru, H.A.3
Valdes, A.4
-
2
-
-
85147085123
-
-
Jumping Beans Inc
-
“FAQ about Jumping Beans”, Jumping Beans Inc., February 2004, http://www.JumpingBeans.com/.
-
(2004)
“FAQ about Jumping Beans”
-
-
-
3
-
-
33751024823
-
Modal Specifications of Trace- Based Security Properties
-
Bologna, Italy
-
Accorsi, R., Basin, D., and Vigano, L., “Modal Specifications of Trace- Based Security Properties”, Proceedings of the Second International Workshop on Security of Mobile Multiagent Systems, Bologna, Italy, July 2002.
-
(2002)
Proceedings of the Second International Workshop on Security of Mobile Multiagent Systems
-
-
Accorsi, R.1
Basin, D.2
Vigano, L.3
-
4
-
-
0003516042
-
-
Technical Report UBLCS96-10, University of Bologna
-
Asperti, A., and Busi, N., “Mobile Petri Nets”, Technical Report UBLCS96-10, University of Bologna, May 1996.
-
(1996)
Mobile Petri Nets
-
-
Asperti, A.1
Busi, N.2
-
5
-
-
0004303012
-
-
INR1A Research Report, PI-1163
-
Badouel, E., and Oliver, J., “Reconfigurable Nets, A Class of high Level Petri Nets Supporting Dynamic Changes within Workflow Systems”, INR1A Research Report, PI-1163, 1998.
-
(1998)
Reconfigurable Nets, a Class of High Level Petri Nets Supporting Dynamic Changes within Workflow Systems
-
-
Badouel, E.1
Oliver, J.2
-
7
-
-
0026002307
-
PROTOB: An Object Oriented Methodology for Developing Discrete Event Dynamic Systems
-
Baldassari, M, Bruno, G., “PROTOB: An Object Oriented Methodology for Developing Discrete Event Dynamic Systems”, Computer Languages, vol. 16, no. 1, pp 39-63, 1991.
-
(1991)
Computer Languages
, vol.16
, Issue.1
, pp. 39-63
-
-
Baldassari, M.1
Bruno, G.2
-
8
-
-
0003253463
-
Approaches in Unifying Petri Nets and the Object Oriented Approach
-
Workshop on Object-Oriented Programming and Models of Concurrency
-
Bastide, R., “Approaches in Unifying Petri Nets and the Object Oriented Approach”, Proceedings of 16th International Conference on Application and Theory of Petri nets, 1st Workshop on Object-Oriented Programming and Models of Concurrency, June 1995.
-
(1995)
Proceedings of 16Th International Conference on Application and Theory of Petri Nets
-
-
Bastide, R.1
-
12
-
-
0000368626
-
Mole-Concepts of a Mobile Agent System
-
1.1.1
-
Baumann, J., Hohl, F., Roghermel, L., and Straβer, M., “Mole-Concepts of a Mobile Agent System”, World Wide Web Journal, special issue on Distributed World Wide Web Processing: Applications and Techniques of Web Agents, 1998. 1.1.1.
-
(1998)
World Wide Web Journal, Special Issue on Distributed World Wide Web Processing: Applications and Techniques of Web Agents
-
-
Baumann, J.1
Hohl, F.2
Roghermel, L.3
Straβer, M.4
-
13
-
-
0007678372
-
-
Technical Report 96/167, Swiss Federal Institute of Technology, Lausanne
-
Biberstein, O., Buchs, D., and Guelfi, N., “A Specification Language for Distributed Systems Engineering”, Technical Report 96/167, Swiss Federal Institute of Technology, Lausanne, 1996.
-
(1996)
A Specification Language for Distributed Systems Engineering
-
-
Biberstein, O.1
Buchs, D.2
Guelfi, N.3
-
16
-
-
0002496417
-
Mobile Agents in Distributed Information Retrieval
-
Springer Verlag, Chapter 15
-
Brewington, R., Gray, R., and Moizumi, K., “Mobile Agents in Distributed Information Retrieval”, Intelligent Information Agents, edited by Mathias Klusch, Springer Verlag, Chapter 15, pp 355-395, 1999.
-
(1999)
Intelligent Information Agents, Edited by Mathias Klusch
, pp. 355-395
-
-
Brewington, R.1
Gray, R.2
Moizumi, K.3
-
18
-
-
85147058183
-
Software-Architectures for Agents and Mobile Robots
-
Aarhus, Denmark, August 26-27
-
Burkhard, H. D., “Software-Architectures for Agents and Mobile Robots”, Proceedings of the Second International Workshop on Modelling of Objects, Components, and Agents (MOCA ‘02), Aarhus, Denmark, August 26-27, pp 1-18 2002.
-
(2002)
Proceedings of the Second International Workshop on Modelling of Objects, Components, and Agents (MOCA ‘02)
, pp. 1-18
-
-
Burkhard, H.D.1
-
19
-
-
84982993891
-
Abstractions for Mobile Computation
-
Springer
-
Cardelli, L., “Abstractions for Mobile Computation”, Secure Internet Programming, Security Issues for Mobile and Distributed Objects, Lecture Notes in Computer Science 1603, Springer, pp 51-94, 1999.
-
(1999)
Secure Internet Programming, Security Issues for Mobile and Distributed Objects, Lecture Notes in Computer Science
, vol.1603
, pp. 51-94
-
-
Cardelli, L.1
-
21
-
-
0032670228
-
Types for the Ambient Calculus
-
Cardelli, L., and Gordon, A.D., “Types for the Ambient Calculus”, Proceedings of 26th Annual ACM Symposium on Principles of Programming Languages, pp 79-92, 1999.
-
(1999)
Proceedings of 26Th Annual ACM Symposium on Principles of Programming Languages
, pp. 79-92
-
-
Cardelli, L.1
Gordon, A.D.2
-
22
-
-
0036376924
-
Design of Adaptive and Reliable Mobile Agent Communication Protocols
-
Vienna, Austria, July 2-5
-
Cao, J., Feng, X., Lu, J., and Das, S. K., “Design of Adaptive and Reliable Mobile Agent Communication Protocols”, Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS’02), Vienna, Austria, pp 471-476, July 2-5, 2002.
-
(2002)
Proceedings of the 22Nd International Conference on Distributed Computing Systems (ICDCS’02)
, pp. 471-476
-
-
Cao, J.1
Feng, X.2
Lu, J.3
Das, S.K.4
-
23
-
-
85147080073
-
-
CERT Coordination Center Denial of Service, http://www.cert.org/tech_tips/denial_of_service.html.
-
-
-
-
24
-
-
0002196661
-
A Formal Model for Object Oriented Petri Nets Modeling
-
An Official Journal of the International Institute for General Systems Studies, Special Issue
-
Ceska, M., and Janousek V, “A Formal Model for Object Oriented Petri Nets Modeling”, Advances in Systems Science and Applications, An Official Journal of the International Institute for General Systems Studies, Special Issue, 1997.
-
(1997)
Advances in Systems Science and Applications
-
-
Ceska, M.1
Janousek, V.2
-
25
-
-
84555222158
-
Securing Mobile Agents for Electronic Commerce: An Experiment
-
Beijing, China, August 22-24
-
Chan, A.H. W., Wong, L.M, Wong, T.Y., and Lyu, M.R., “Securing Mobile Agents for Electronic Commerce: An Experiment”, Proceedings of Fifteenth Annual Working Conference on Information Security, Beijing, China, pp 471-480, August 22-24, 2000.
-
(2000)
Proceedings of Fifteenth Annual Working Conference on Information Security
, pp. 471-480
-
-
Chan, A.H.W.1
Wong, L.M.2
Wong, T.Y.3
Lyu, M.R.4
-
26
-
-
0003906677
-
-
IBM Research report, J. Watson Research Center
-
Chess, D., Harrison, C, and Kershenbaum, A., “Mobile Agents: Are They a Good Idea?”, IBM Research report, J. Watson Research Center, March 1995.
-
(1995)
Mobile Agents: Are they a Good Idea?
-
-
Chess, D.1
Harrison, C.2
Kershenbaum, A.3
-
27
-
-
0029392001
-
Itinerant Agents for Mobile Computing
-
Chess, D., Grosof, B., and Harrison, C, “Itinerant Agents for Mobile Computing”, IEEE Personal Communications, pp 34-49, October 1995.
-
(1995)
IEEE Personal Communications
, pp. 34-49
-
-
Chess, D.1
Grosof, B.2
Harrison, C.3
-
28
-
-
0002380598
-
Security Issues in Mobile Code Systems
-
Giovanni Vigna (Ed.), Springer-Verlag
-
Chess, D., “Security Issues in Mobile Code Systems”, Mobile Agents and Security, Giovanni Vigna (Ed.), Springer-Verlag, pp 1-14, 1998.
-
(1998)
Mobile Agents and Security
, pp. 1-14
-
-
Chess, D.1
-
29
-
-
85147080132
-
Modelling with Coloured Petri Nets
-
Aarhus, Denmark, August 26-27
-
Christensen, S., “Modelling with Coloured Petri Nets”, Proceedings of the Second International Workshop on Modelling of Objects, Components, and Agents (MOCA’02), Aarhus, Denmark, August 26-27, 2002.
-
(2002)
Proceedings of the Second International Workshop on Modelling of Objects, Components, and Agents (MOCA’02)
-
-
Christensen, S.1
-
30
-
-
0009939780
-
Modeling Agent Conversations with Colored Petri Nets
-
Seattle, Washington
-
Cost, R. S., Chen, Y., Finin, T., Labrou, Y., and Peng Y., “Modeling Agent Conversations with Colored Petri Nets”, Working Notes of the Workshop on Specifying and Implementing Conversation Policies, Autonomous Agents ‘99, Seattle, Washington, May 1999.
-
(1999)
Working Notes of the Workshop on Specifying and Implementing Conversation Policies, Autonomous Agents ‘99
-
-
Cost, R.S.1
Chen, Y.2
Finin, T.3
Labrou, Y.4
Peng, Y.5
-
31
-
-
0032688843
-
Modeling Network Topology and Mobile Agent Interaction: An Integrated Framework
-
Cremonini, M., Omicini, A., andZambonelli, F., “Modeling Network Topology and Mobile Agent Interaction: An Integrated Framework”, Proceedings of the 1999 ACM symposium on Applied computing (SAC’99), pp 410-412, 1999.
-
(1999)
Proceedings of the 1999 ACM Symposium on Applied Computing (SAC’99)
, pp. 410-412
-
-
Cremonini, M.1
Omicini, A.2
Zambonelli, F.3
-
33
-
-
85039244531
-
Using Design/CPN to Design a Visualization Extension for Design/CPN
-
Aarhus, Denmark, August 28-30
-
Elliot, M., Billington, J., and Kristensen L. M., “Using Design/CPN to Design a Visualization Extension for Design/CPN”, Proceedings of the Fourth International Workshop on Practical Use of Colored Petri Nets and the CPN Tools, Aarhus, Denmark, pp 21-38, August 28-30, 2002.
-
(2002)
Proceedings of the Fourth International Workshop on Practical Use of Colored Petri Nets and the CPN Tools
, pp. 21-38
-
-
Elliot, M.1
Billington, J.2
Kristensen, L.M.3
-
35
-
-
84949751564
-
Security for Mobile Agents: Authentication and State Appraisal
-
Farmer, W. M., Guttmann, J D., and Swarup V., “Security for Mobile Agents: Authentication and State Appraisal”, Proceedings of the Fourth European Symposium on Research in Computer Security, pp 118-130, 1996.
-
(1996)
Proceedings of the Fourth European Symposium on Research in Computer Security
, pp. 118-130
-
-
Farmer, W.M.1
Guttmann, J.D.2
Swarup, V.3
-
36
-
-
0002584180
-
Security for Mobile Agents: Issues and Requirements
-
Farmer, W. M., Guttmann, J D., and Swarup V., “Security for Mobile Agents: Issues and Requirements”, Proceedings of the 19th National Information Systems Security Conference, vol. 2, pp 591-597, 1996.
-
(1996)
Proceedings of the 19Th National Information Systems Security Conference
, vol.2
, pp. 591-597
-
-
Farmer, W.M.1
Guttmann, J.D.2
Swarup, V.3
-
38
-
-
8344287279
-
Modeling Multi-Agent Systems Activities Through Colored Petri Nets
-
Germany, Fevereiro
-
Fernandes, J. M., and Belo, O., “Modeling Multi-Agent Systems Activities Through Colored Petri Nets”, Proceedings of 16th IASTED International Conference on Applied Informatics, Germany, Fevereiro 1998.
-
(1998)
Proceedings of 16Th IASTED International Conference on Applied Informatics
-
-
Fernandes, J.M.1
Belo, O.2
-
39
-
-
33750941072
-
An Overview of Internet Security
-
Kish Island, Iran, May 1-3
-
Fernandez, E. B., “An Overview of Internet Security”, Proceedings of the World’s Internet & Electronic Cities Conference (WIECC 2001), Kish Island, Iran, May 1-3, 2001.
-
(2001)
Proceedings of the World’s Internet & Electronic Cities Conference (WIECC 2001)
-
-
Fernandez, E.B.1
-
40
-
-
33751087986
-
SEFS: Security Module for Extensible File System Architectures
-
Barcelona
-
Ferreira, L., Zuquete, A., Ferreira, P., “SEFS: Security Module for Extensible File System Architectures”, Proceedings of European Conference on Information Security Solutions (ISSE), Barcelona, September 2000.
-
(2000)
Proceedings of European Conference on Information Security Solutions (ISSE)
-
-
Ferreira, L.1
Zuquete, A.2
Ferreira, P.3
-
41
-
-
85147056776
-
-
Firewall Software White Paper, http://www.firewallsoftware.com/firewall_faws/types_of_firewall.html
-
-
-
-
42
-
-
0028422189
-
The Challenges of Mobile Computing
-
Forman, G. H., “The Challenges of Mobile Computing”, IEEE Computer, pp 38-47, 1994.
-
(1994)
IEEE Computer
, pp. 38-47
-
-
Forman, G.H.1
-
43
-
-
84955565479
-
A Calculus of Mobile Agents
-
LNCS
-
Fournet, C, and Gonthier, G., “A Calculus of Mobile Agents”, Proceedings of the 7th International Conference on Concurrency Theory (CONCUR ‘96), LNCS 1119, pp 406-421, 1996.
-
(1996)
Proceedings of the 7Th International Conference on Concurrency Theory (CONCUR ‘96)
, vol.1119
, pp. 406-421
-
-
Fournet, C.1
Gonthier, G.2
-
44
-
-
4544373958
-
Understanding Code Mobility
-
Fuggetta, A., Picco, G. P., and Vigna, G., “Understanding Code Mobility”, IEEE Transactions on Software Engineering, Vol. 24, No. 5, pp 342-361, May 1998.
-
(1998)
IEEE Transactions on Software Engineering
, vol.24
, Issue.5
, pp. 342-361
-
-
Fuggetta, A.1
Picco, G.P.2
Vigna, G.3
-
45
-
-
85037513439
-
HOOD Nets
-
LNCS, Springer, Berlin
-
Giovanni, D., “HOOD Nets”, Advances in Petri Nets, LNCS 524, Springer, Berlin, pp 140-160, 1991.
-
(1991)
Advances in Petri Nets
, vol.524
, pp. 140-160
-
-
Giovanni, D.1
-
48
-
-
23044531604
-
Notes on Nominal Calculi for Security and Mobility
-
LNCS
-
Gordon, A.D., “Notes on Nominal Calculi for Security and Mobility”, Foundations of Security Analysis and Design, LNCS 2171, pp 262-330, 2002.
-
(2002)
Foundations of Security Analysis and Design
, vol.2171
, pp. 262-330
-
-
Gordon, A.D.1
-
49
-
-
0003527999
-
-
Technical Report PCS-TR96-285, Dartmouth College, Computer Science, Hanover, NH
-
Gray, R., “Mobile Agents for Mobile Computing”, Technical Report PCS-TR96-285, Dartmouth College, Computer Science, Hanover, NH, May 1996.
-
(1996)
Mobile Agents for Mobile Computing
-
-
Gray, R.1
-
51
-
-
0002992633
-
DAgents: Security in a Multiple-Language, Mobile-Agent System”
-
Gray, R. S., Kotz, D., Cybenko, G. and Rus, D., “D’Agents: Security in a Multiple-Language, Mobile-Agent System”, Mobile Agents and Security, pp 154-187, 1998.
-
(1998)
Mobile Agents and Security
, pp. 154-187
-
-
Gray, R.S.1
Kotz, D.2
Cybenko, G.3
Rus, D.4
-
52
-
-
0004159391
-
-
Technical Report TR2000-365, Dept. of Computer Science, Dartmouth College
-
Gray, R., Kotz, D., Cybenko, G., Rus, D., “Mobile Agents: Motivations and State-of-the-art Systems”, Technical Report TR2000-365, Dept. of Computer Science, Dartmouth College.
-
Mobile Agents: Motivations and State-Of-The-Art Systems
-
-
Gray, R.1
Kotz, D.2
Cybenko, G.3
Rus, D.4
-
53
-
-
0003527999
-
-
Technical Report PCS-TR96-285, Department of Computer Science, Dartmouth College
-
Gray, R., “Mobile Agents for Mobile Computing”, Technical Report PCS-TR96-285, Department of Computer Science, Dartmouth College.
-
Mobile Agents for Mobile Computing
-
-
Gray, R.1
-
54
-
-
0004043835
-
-
Technical Report of the Esprit Long Term Research Project 20072 “Design For Validation”, University of Newcastle Upon Tyne, Department of Computing Science
-
Guelfi, N., Biberstein, O., and Buchs, D, Canver, E., Gaudel, M. C, Henke, and F., Schwier, D., “Comparison of Object Oriented Formal Methods”, Technical Report of the Esprit Long Term Research Project 20072 “Design For Validation”, University of Newcastle Upon Tyne, Department of Computing Science, 1997.
-
(1997)
Comparison of Object Oriented Formal Methods
-
-
Guelfi, N.1
Biberstein, O.2
Buchs, D.3
Canver, E.4
Gaudel, M.C.5
Henke, F.6
Schwier, D.7
-
55
-
-
85061355558
-
A Protection Scheme for Mobile Agents on Java
-
Hagimont, D., and Ismail, L., “A Protection Scheme for Mobile Agents on Java”, Proceedings of MobiCom: 3rd ACM/IEEE International Conference on Mobile Computing and Networking, pp 215-222, 1997.
-
(1997)
Proceedings of Mobicom: 3Rd ACM/IEEE International Conference on Mobile Computing and Networking
, pp. 215-222
-
-
Hagimont, D.1
Ismail, L.2
-
56
-
-
0035518081
-
A Petri-Net-Based Model for the Mathematical Analysis of Multi-Agent Systems
-
Hiraishi, K., “A Petri-Net-Based Model for the Mathematical Analysis of Multi-Agent Systems”, IEICE Transactions on Fundamentals, vol. E84 A, no.l 1, pp 2829-1837, November 2001.
-
(2001)
IEICE Transactions on Fundamentals
, vol.E84
, Issue.1
, pp. 1837-2829
-
-
Hiraishi, K.1
-
58
-
-
0006512545
-
A Model of Attacks of Malicious Hosts Against Mobile Agents
-
INRIA, France
-
Hohl, F., “A Model of Attacks of Malicious Hosts Against Mobile Agents”, Proceedings of the ECOOP Workshop on Distributed Object Security and 4th Workshop on Mobile Object Systems: Secure Internet Mobile Computations, pp 105-120, INRIA, France, 1998.
-
(1998)
Proceedings of the ECOOP Workshop on Distributed Object Security and 4Th Workshop on Mobile Object Systems: Secure Internet Mobile Computations
, pp. 105-120
-
-
Hohl, F.1
-
59
-
-
0001943763
-
Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts
-
Hohl, F., “Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts”, Mobile Agents and Security, Lecture Notes in Computer Science, vol. 1419, pp 92-113, 1998.
-
(1998)
Mobile Agents and Security, Lecture Notes in Computer Science
, vol.1419
, pp. 92-113
-
-
Hohl, F.1
-
60
-
-
0012781149
-
Agents and Petri Nets
-
Holvoet, T., “Agents and Petri Nets”, Petri Net Newsletter, no. 49, pp 3-8, October 1995.
-
(1995)
Petri Net Newsletter
, vol.49
, pp. 3-8
-
-
Holvoet, T.1
-
62
-
-
17144401190
-
A Performance Evaluation of the Mobile Agent Paradigm
-
Ismail, L., and Hagimont, D., “A Performance Evaluation of the Mobile Agent Paradigm”, ACM SIGPLAN Notices, 34(10), pp 306-313, October 1999.
-
(1999)
ACM SIGPLAN Notices
, vol.34
, Issue.10
, pp. 306-313
-
-
Ismail, L.1
Hagimont, D.2
-
64
-
-
27944456637
-
Mobile Agents and Security
-
Jansen, W. A., Karygiannis, T., “Mobile Agents and Security”, National Institute of Standards and Technology, Special Publication 800-19, August 1999.
-
(1999)
National Institute of Standards and Technology, Special Publication 800-19
-
-
Jansen, W.A.1
Karygiannis, T.2
-
65
-
-
0004598657
-
A Privilege Management Scheme for Mobile Agent Systems
-
Montreal, Canada
-
Jansen, W. A., “A Privilege Management Scheme for Mobile Agent Systems”, Autonomous Agents conference, Montreal, Canada, May 2001.
-
(2001)
Autonomous Agents Conference
-
-
Jansen, W.A.1
-
67
-
-
0003692969
-
-
Technical Report 95-23, Department of Computer Science, University of Tromsø
-
Johansen, D., Renessen, R., and Schneider, F., “An Introduction to the TACOMA Distributed System”, Technical Report 95-23, Department of Computer Science, University of Tromsø, June 1995.
-
(1995)
An Introduction to the TACOMA Distributed System
-
-
Johansen, D.1
Renessen, R.2
Schneider, F.3
-
68
-
-
0003290867
-
What TACOMA taught us
-
Addison Wesley
-
Johansen, D., Schneider, F. and Renessen, R., “What TACOMA taught us”, Mobility, Mobile Agents and Process Migration-An Edited Collection, Addison Wesley, 1998.
-
(1998)
Mobility, Mobile Agents and Process Migration-An Edited Collection
-
-
Johansen, D.1
Schneider, F.2
Renessen, R.3
-
69
-
-
0042291577
-
Using An Object-Oriented Diagram Technique for the Design of Information Systems
-
Amsterdam, New York
-
Kappel, G., and Schrefl, M., “Using An Object-Oriented Diagram Technique for the Design of Information Systems”, Dynamic Modelling of Information Systems, Amsterdam, New York, 1991.
-
(1991)
Dynamic Modelling of Information Systems
-
-
Kappel, G.1
Schrefl, M.2
-
70
-
-
3042776024
-
A Security Model for Aglets
-
Giovanni Vigna (Ed.), Springer-Verlag
-
Karjoth, G., Lange, D. B., and Oshima, M., “A Security Model for Aglets”, Mobile Agents and Security, Giovanni Vigna (Ed.), Springer-Verlag, pp 188-205, 1998.
-
(1998)
Mobile Agents and Security
, pp. 188-205
-
-
Karjoth, G.1
Lange, D.B.2
Oshima, M.3
-
71
-
-
0003316753
-
Agent Server Architecture for the Ajanta Mobile-Agent System
-
Karnik, N., Tripathi, A., “Agent Server Architecture for the Ajanta Mobile-Agent System”, Proceedings of the 1998 International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA ‘98), pp 66-73, July 1998.
-
(1998)
Proceedings of the 1998 International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA ‘98)
, pp. 66-73
-
-
Karnik, N.1
Tripathi, A.2
-
72
-
-
85037507716
-
A Simple, yet Expressive and Flexible Formalism for Business Modelling
-
Zaragoza, Spain, June
-
Keller, R. K., Shen, X., and Bochmann, G., “A Simple, yet Expressive and Flexible Formalism for Business Modelling”, Proceedings of the Workshop on Computer-Supported Cooperative Work, Petri Nets and Related Formalisms, pp 51-55, Zaragoza, Spain, June 1994.
-
(1994)
Proceedings of the Workshop on Computer-Supported Cooperative Work, Petri Nets and Related Formalisms
, pp. 51-55
-
-
Keller, R.K.1
Shen, X.2
Bochmann, G.3
-
73
-
-
3543052675
-
-
Technical Report No. 786, University at Stony Brook, College of Engineering and Applied Science, Nov. 30
-
Kim, S. H., and Robertazzi, T. G, “Mobile Agent Modeling”, Technical Report No. 786, University at Stony Brook, College of Engineering and Applied Science, Nov. 30, 2000.
-
(2000)
Mobile Agent Modeling
-
-
Kim, S.H.1
Robertazzi, T.G.2
-
75
-
-
84958674625
-
Security of Electronic Business Applications: Structure and Quantification
-
Knorr, K., and Rohrig, S., “Security of Electronic Business Applications: Structure and Quantification”, Proceedings of First International Conference on Electronic Commerce and Web Technologies, pp 25-37, 2000.
-
(2000)
Proceedings of First International Conference on Electronic Commerce and Web Technologies
, pp. 25-37
-
-
Knorr, K.1
Rohrig, S.2
-
76
-
-
0030677523
-
Execution Monitoring of Security-Critical Programs in Distributed System: A Specification-Based Approach
-
Ko, C, Ruschitzka, M., and Levitt, K., “Execution Monitoring of Security-Critical Programs in Distributed System: A Specification-Based Approach”, Proceedings of the 1997 IEEE Symposium on Security and Privacy, pp 175-187, May 1997.
-
(1997)
Proceedings of the 1997 IEEE Symposium on Security and Privacy
, pp. 175-187
-
-
Ko, C.1
Ruschitzka, M.2
Levitt, K.3
-
77
-
-
84947220045
-
Modelling the Structure and Behavior of Petri Net Agents
-
(ICATPN 2001)
-
Kohler, M., Moldt, D., and Rolke, H., “Modelling the Structure and Behavior of Petri Net Agents”, Proceedings of 22nd International Conference on Application and Theory of Petri Nets (ICATPN 2001), pp 224-241,2001.
-
(2001)
Proceedings of 22Nd International Conference on Application and Theory of Petri Nets
, pp. 224-241
-
-
Kohler, M.1
Moldt, D.2
Rolke, H.3
-
78
-
-
16244376872
-
Modelling Mobility and Mobile Agents Using Nets Within Nets
-
Aarhus, Denmark, August 26-27
-
Köhler, M., and Rölke, H., “Modelling Mobility and Mobile Agents Using Nets Within Nets”, Proceedings of the Second International Workshop on Modelling of Objects, Components, and Agents (MOCA’02), pp 141-157, Aarhus, Denmark, August 26-27, 2002.
-
(2002)
Proceedings of the Second International Workshop on Modelling of Objects, Components, and Agents (MOCA’02)
, pp. 141-157
-
-
Köhler, M.1
Rölke, H.2
-
79
-
-
84958968002
-
Secure Transactions with Mobile Agents in Hostile Environments
-
LNCS
-
Kotzanikolaou, P., Burmester, M., and Chrissikopoulos, V., “Secure Transactions with Mobile Agents in Hostile Environments”, ACISP 2000, LNCS 1841, pp 289-297, 2000.
-
(2000)
ACISP 2000
, vol.1841
, pp. 289-297
-
-
Kotzanikolaou, P.1
Burmester, M.2
Chrissikopoulos, V.3
-
80
-
-
0029328146
-
Multiagent Negotiation Under Time Constraints
-
Kraus, S., Wilkenfeld, J., and ZIotkin, G., “Multiagent Negotiation Under Time Constraints”, Artificial Intelligence Journal 75(2), pp 297-345, 1995.
-
(1995)
Artificial Intelligence Journal
, vol.75
, Issue.2
, pp. 297-345
-
-
Kraus, S.1
Wilkenfeld, J.2
Ziotkin, G.3
-
81
-
-
35248839671
-
Interacting State Machines for Mobility Formal Methods
-
September 8-14
-
Kuhn, T. A. and Oheimb, D., “Interacting State Machines for Mobility Formal Methods”, Proceedings of the International Symposium of Formal Methods, Lecture Notes in Computer Science, vol. 2805, pp 698-718, September 8-14, 2003.
-
(2003)
Proceedings of the International Symposium of Formal Methods, Lecture Notes in Computer Science
, vol.2805
, pp. 698-718
-
-
Kuhn, T.A.1
Oheimb, D.2
-
82
-
-
0002028280
-
A Pattern Matching Model for Misuse Intrusion Detection
-
Kumar, S., and Spafford, E., “A Pattern Matching Model for Misuse Intrusion Detection”, Proceedings of the 17th National Computer Security Conference, pp 11-21, October 1994.
-
(1994)
Proceedings of the 17Th National Computer Security Conference
, pp. 11-21
-
-
Kumar, S.1
Spafford, E.2
-
85
-
-
5044238040
-
Object Oriented Modelling with Object Petri Nets
-
G. Agha, F.D. Cindio, and G. Rozenberg (eds.), Lecture Notes in Computer Science 2001, Springer-Verlag
-
Lakos, C, “Object Oriented Modelling with Object Petri Nets”, Concurrent Object-Oriented Programming and Petri Nets, G. Agha, F.D. Cindio, and G. Rozenberg (eds.), Lecture Notes in Computer Science 2001, Springer-Verlag 2001.
-
(2001)
Concurrent Object-Oriented Programming and Petri Nets
-
-
Lakos, C.1
-
87
-
-
0007917299
-
Modeling manufacturing systems using object-oriented colored Petri nets
-
Li, X., Xu, X. and Rosano, F. L., “Modeling manufacturing systems using object-oriented colored Petri nets”, International Journal of Intelligent Control Systems, vol. 3, no. 3, pp 359-375, 1999.
-
(1999)
International Journal of Intelligent Control Systems
, vol.3
, Issue.3
, pp. 359-375
-
-
Li, X.1
Xu, X.2
Rosano, F.L.3
-
88
-
-
84877773686
-
Javabased Mobile Agents-How to Migrate, Persist, and Interact on Electronic Service Markets
-
Berlin, Springer LNCS #1219
-
Liberman, B., Griffel, F., Merz, M., and Lamersdorf, W., “Javabased Mobile Agents-How to Migrate, Persist, and Interact on Electronic Service Markets”, Proceedings of Mobile Agents 97 Workshop, Berlin, Springer LNCS #1219 1997.
-
(1997)
Proceedings of Mobile Agents 97 Workshop
-
-
Liberman, B.1
Griffel, F.2
Merz, M.3
Lamersdorf, W.4
-
89
-
-
2342601383
-
Non- Repudiation in An Agent-Based Electronic Commerce System
-
Florence, Italy, August 30-September 3
-
Liew, C. C, Ng, W.-K., Lim, E. P., Tan, B. S., and Ong, K. L., “Non- Repudiation in An Agent-Based Electronic Commerce System”, Proceedings of the International Workshop on Electronic Commerce and Security, Florence, Italy, August 30-September 3, 1999.
-
(1999)
Proceedings of the International Workshop on Electronic Commerce and Security
-
-
Liew, C.C.1
Ng, W.-K.2
Lim, E.P.3
Tan, B.S.4
Ong, K.L.5
-
90
-
-
85147063383
-
A Notion of Safeness in Time for Petri Nets
-
San Francisco
-
Ling, S., and Schmidt, H. W., “A Notion of Safeness in Time for Petri Nets”, Proceedings of International Software Engineering Conference (IASTED-SE 97), San Francisco, pp 344-350, 1997.
-
(1997)
Proceedings of International Software Engineering Conference (IASTED-SE 97)
, pp. 344-350
-
-
Ling, S.1
Schmidt, H.W.2
-
91
-
-
0040492221
-
An Infrastructure for Mobile Agents: Requirements and Architecture
-
Orlando, Florida
-
Lingnau, A., and Drobnic, O., “An Infrastructure for Mobile Agents: Requirements and Architecture”, Proceedings of 13th DIS Workshop, Orlando, Florida, September 1995.
-
(1995)
Proceedings of 13Th DIS Workshop
-
-
Lingnau, A.1
Drobnic, O.2
-
92
-
-
2942673574
-
Secure Data Collection with Updates
-
Loureiro S., Molva, R., and Pannetrat A., “Secure Data Collection with Updates”, Electronic Commerce Research, vol. 1, no. 1-2, pp 119-131, 2001.
-
(2001)
Electronic Commerce Research
, vol.1
, Issue.1-2
, pp. 119-131
-
-
Loureiro, S.1
Molva, R.2
Pannetrat, A.3
-
93
-
-
85147068010
-
-
Research Report 95-34, FB Informatik, Technical University Berlin
-
Lwe, M., Wikarski, D., and Han, Y., “Higher-Order Object Nets and their Application to Workflow Modeling”, Research Report 95-34, FB Informatik, Technical University Berlin, 1995.
-
(1995)
Higher-Order Object Nets and Their Application to Workflow Modeling
-
-
Lwe, M.1
Wikarski, D.2
Han, Y.3
-
95
-
-
85147075289
-
Modeling a Secure Mobile Agent System with Petri nets Scheme
-
Taiwan, May 16-17
-
Ma, L., Tsai, J. J.P., and Murata, T., “Modeling a Secure Mobile Agent System with Petri nets Scheme”, Proceedings of 12th Information Security Conference, pp 399-406, Taiwan, May 16-17, 2002.
-
(2002)
Proceedings of 12Th Information Security Conference
, pp. 399-406
-
-
Ma, L.1
Tsai, J.J.P.2
Murata, T.3
-
96
-
-
85006563765
-
Extended Elementary Object System Model for Mobile Agent Security
-
Dec 3-6
-
Ma, L., Tsai, J. J.P., Deng, Y., and Murata, T., “Extended Elementary Object System Model for Mobile Agent Security”, Proceedings of 2003 World Congress on Integrated Design and Process Technology, pp 169-178, Dec 3-6, 2003.
-
(2003)
Proceedings of 2003 World Congress on Integrated Design and Process Technology
, pp. 169-178
-
-
Ma, L.1
Tsai, J.J.P.2
Deng, Y.3
Murata, T.4
-
97
-
-
18744364719
-
A Secure Mobile Agent System Model Based on Extended Elementary Object Net
-
Ma, L., and Tsai, J.J.P., “A Secure Mobile Agent System Model Based on Extended Elementary Object Net”, Proceedings of 25th IEEE Int’l Computer Software and Applications Conference, pp 218-223, Sept. 2004.
-
(2004)
Proceedings of 25Th IEEE Int’l Computer Software and Applications Conference
, pp. 218-223
-
-
Ma, L.1
Tsai, J.J.P.2
-
98
-
-
84968912294
-
Attacks and Countermeasures in Software System Security
-
Ma, L., and Tsai, J. J.P., “Attacks and Countermeasures in Software System Security”, Handbook of Software Engineering and Knowledge Engineering, Vol. 3, 2005.
-
(2005)
Handbook of Software Engineering and Knowledge Engineering
, vol.3
-
-
Ma, L.1
Tsai, J.J.P.2
-
99
-
-
84976753721
-
A Class of Generalized Stochastic Petri Nets for the Performance Evaluztion of Multiprocessor Systems
-
Marsan, M. A., Balbo, G., and Conte, G., “A Class of Generalized Stochastic Petri Nets for the Performance Evaluztion of Multiprocessor Systems”, ACM transactions on Computer Science, vol. 2, no. 2, pp 93-122, May 1984.
-
(1984)
ACM Transactions on Computer Science
, vol.2
, Issue.2
, pp. 93-122
-
-
Marsan, M.A.1
Balbo, G.2
Conte, G.3
-
100
-
-
10844229866
-
Detecting Attacks on Mobile Agents
-
Monterey, CA
-
Meadows, C, “Detecting Attacks on Mobile Agents”, Proceedings of 1997 Foundations for Secure Mobile Code Workshop, pp 64-65, Monterey, CA, March 1997.
-
(1997)
Proceedings of 1997 Foundations for Secure Mobile Code Workshop
, pp. 64-65
-
-
Meadows, C.1
-
101
-
-
0347862087
-
Rewriting Logic and Secure Mobility
-
Meseguer, J., and Talcott, C, “Rewriting Logic and Secure Mobility”, Proceedings of DARPA Workshop on Foundations for Secure Mobile Code Workshop, pp 26-28, March 1997
-
(1997)
Proceedings of DARPA Workshop on Foundations for Secure Mobile Code Workshop
, pp. 26-28
-
-
Meseguer, J.1
Talcott, C.2
-
103
-
-
0005433665
-
-
Technical Report MIS-CIS-98-28, Department of Computer and Information Science, University of Pennsylvania
-
Moore, J. T., “Mobile code Security Techniques”, Technical Report MIS-CIS-98-28, Department of Computer and Information Science, University of Pennsylvania, May 1998.
-
(1998)
Mobile Code Security Techniques
-
-
Moore, J.T.1
-
104
-
-
18944385303
-
Anchor Toolkit (A Secure Mobile Agent System)
-
Mudumbai, S., Essiari, A., and Johnston, W., “Anchor Toolkit (A Secure Mobile Agent System)”, Proceedings of Mobile Agents ‘99 Conference, October 1999.
-
(1999)
Proceedings of Mobile Agents ‘99 Conference
-
-
Mudumbai, S.1
Essiari, A.2
Johnston, W.3
-
106
-
-
0024645936
-
Petri Nets: Properties, Analysis, and Applications
-
Murata, T., “Petri Nets: Properties, Analysis, and Applications”, Proceedings of the IEEE, pp 541-580, April 1989.
-
(1989)
Proceedings of the IEEE
, pp. 541-580
-
-
Murata, T.1
-
107
-
-
85084097858
-
Safe Kernel Extensions without Run-Time Checking
-
Seattle, Washington, October 28-31
-
Necula, G. C, and Lee, P., “Safe Kernel Extensions without Run-Time Checking”, Proceedings of Second Symposium on Operating Systems Design and Implementation (OSDI ‘96), Seattle, Washington, October 28-31, 1996.
-
(1996)
Proceedings of Second Symposium on Operating Systems Design and Implementation (OSDI ‘96)
-
-
Necula, G.C.1
Lee, P.2
-
108
-
-
0030685617
-
Proof-Carrying Code
-
Paris, Fance, January 15-17
-
Necula, G. C, “Proof-Carrying Code”, Proceedings of the 24th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL’97), Paris, Fance, January 15-17, 1997.
-
(1997)
Proceedings of the 24Th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL’97)
-
-
Necula, G.C.1
-
109
-
-
0001800257
-
Safe, Untrusted Agents Using Proof- Carrying Code
-
Springer-Verlag
-
Necula, G. C, and Lee, P., “Safe, Untrusted Agents Using Proof- Carrying Code”, Mobile Agents and Security, pp 61-91, Springer-Verlag (1998).
-
(1998)
Mobile Agents and Security
, pp. 61-91
-
-
Necula, G.C.1
Lee, P.2
-
110
-
-
85147067595
-
Formal Modeling of Multi- Agent Interaction in Distributed Scheduling
-
Lausanne, Switzerland
-
Neuendorf, K.-P., and Hannebauer, M., “Formal Modeling of Multi- Agent Interaction in Distributed Scheduling”, Proceedings of the 16th IMACS World Congress on Scientific Computation, Applied Mathematics and Simulation (IMACS-2000). Lausanne, Switzerland, 2000.
-
(2000)
Proceedings of the 16Th IMACS World Congress on Scientific Computation, Applied Mathematics and Simulation (IMACS-2000)
-
-
Neuendorf, K.-P.1
Hannebauer, M.2
-
111
-
-
0001053482
-
An Approach to Object System Modeling by State-Based Object Petri Nets
-
Newman, A., Shatz, S. M., and Xie, X., “An Approach to Object System Modeling by State-Based Object Petri Nets”, International Journal of Circuits, Systems, and Computers, vol. 8, no. 1, pp 1-20, Feb. 1998.
-
(1998)
International Journal of Circuits, Systems, and Computers
, vol.8
, Issue.1
, pp. 1-20
-
-
Newman, A.1
Shatz, S.M.2
Xie, X.3
-
112
-
-
85147085048
-
A Mobile Agent Model: Applications for E-Commerce
-
Nguyen, A, Stewart, I. and Yang, X., “A Mobile Agent Model: Applications for E-Commerce”, Proceedings of Seventh Australian World Wide Web Conference, pp 21-25, April 2001.
-
(2001)
Proceedings of Seventh Australian World Wide Web Conference
, pp. 21-25
-
-
Nguyen, A.1
Stewart, I.2
Yang, X.3
-
113
-
-
34247233812
-
A Security Framework for a Mobile Agent System
-
Noordende, G., Trazier, F. M.T., and Tanenbaum, A. S., “A Security Framework for a Mobile Agent System”, Proceedings of 6th European Symposium on Research in Computer Security (ESORICS 2000), pp 273-290, 2000.
-
(2000)
Proceedings of 6Th European Symposium on Research in Computer Security (ESORICS 2000)
, pp. 273-290
-
-
Noordende, G.1
Trazier, F.M.T.2
Tanenbaum, A.S.3
-
114
-
-
85147079994
-
-
Object Petri Net Research at the University of Adelaide, http://www.cs.adelaide.edu.au/charles/OPN.html.
-
-
-
-
118
-
-
34547721788
-
MASSA: Mobile Agents Security through Static/Dynamic Analysis
-
Orso, A., Vigna, G. and Harrold, M. J., “MASSA: Mobile Agents Security through Static/Dynamic Analysis”, Proceedings of the ICSE Workshop on Software Engineering and Mobility, May 2001.
-
(2001)
Proceedings of the ICSE Workshop on Software Engineering and Mobility
-
-
Orso, A.1
Vigna, G.2
Harrold, M.J.3
-
119
-
-
0003613073
-
-
Technical Report TR-97-60, Sun Microsystem Laboratories
-
Ousterbout, J. K., Levy, J. Y., and Welch, B. B., “The Safe-Tel Security Model”, Technical Report TR-97-60, Sun Microsystem Laboratories, 1997.
-
(1997)
The Safe-Tel Security Model
-
-
Ousterbout, J.K.1
Levy, J.Y.2
Welch, B.B.3
-
120
-
-
0034247878
-
Agent-Oriented Software Modeling with UML Approach
-
D
-
Park, S., Kim, J. and Lee, S., “Agent-Oriented Software Modeling with UML Approach”, IEICE Transactions on Information & System, vol. E83-D, no. 8, pp 1631-1641, August 2000.
-
(2000)
IEICE Transactions on Information & System
, vol.E83
, Issue.8
, pp. 1631-1641
-
-
Park, S.1
Kim, J.2
Lee, S.3
-
122
-
-
84958968372
-
The Architecture for the Ara Platform for Mobile Agents
-
Peine, H., and Stolpmann, T., “The Architecture for the Ara Platform for Mobile Agents”, Proceedings of the First International Workshop on Mobile Agents (MA’97), vol. 1219 of Lecture Notes in Computer Science pp 50-61, 1997.
-
(1997)
Proceedings of the First International Workshop on Mobile Agents (MA’97), Vol. 1219 of Lecture Notes in Computer Science
, pp. 50-61
-
-
Peine, H.1
Stolpmann, T.2
-
123
-
-
0040027498
-
Reasoning About Code Mobility in Mobile UNITY
-
Picco, G. P., Roman, G. C, and McCann, P. J., “Reasoning About Code Mobility in Mobile UNITY”, ACM Transactions on Software Engineering and Methodology (TOSEM), vol. 10, no. 3, pp 338-395, July 2001.
-
(2001)
ACM Transactions on Software Engineering and Methodology (TOSEM)
, vol.10
, Issue.3
, pp. 338-395
-
-
Picco, G.P.1
Roman, G.C.2
McCann, P.J.3
-
124
-
-
84959923653
-
Security Mechanisms for the MAP Agent System
-
January 19-21
-
Puliafito, A. and Tomarchio, O., “Security Mechanisms for the MAP Agent System”, Proceedings of the 8th Euromicro Workshop on Parallel and Distributed Processing, pp 84-91, January 19-21, 2000.
-
(2000)
Proceedings of the 8Th Euromicro Workshop on Parallel and Distributed Processing
, pp. 84-91
-
-
Puliafito, A.1
Tomarchio, O.2
-
125
-
-
33847209898
-
Mobile UNITY Schemas for Agent Coordination
-
LNCS, Springer
-
Roman, G. C, and Payton, J., “Mobile UNITY Schemas for Agent Coordination”, Proceedings of the 10th International Workshop on Abstract State Machines, LNCS 2589, Springer, pp 126-150, March 2003.
-
(2003)
Proceedings of the 10Th International Workshop on Abstract State Machines
, vol.2589
, pp. 126-150
-
-
Roman, G.C.1
Payton, J.2
-
126
-
-
84947912805
-
Secure Recording of Itineraries through Co-operating Agents
-
July 20-24
-
Roth, V., “Secure Recording of Itineraries through Co-operating Agents”, Proceedings of ECOOP’98 Workshops, Lecture Notes in Computer Science 1543, pp 297-298, July 20-24, 1998.
-
(1998)
Proceedings of ECOOP’98 Workshops, Lecture Notes in Computer Science
, vol.1543
, pp. 297-298
-
-
Roth, V.1
-
127
-
-
84948143184
-
On the Robustness of Some Cryptographic Protocols for Mobile Agent Protection
-
LNCS, Atlanta, GA, December 2-4
-
Roth, V., “On the Robustness of Some Cryptographic Protocols for Mobile Agent Protection”, Proceedings of the 5th International Conference MA 2001, LNCS 2240, pp 1-14, Atlanta, GA, December 2-4, 2001.
-
(2001)
Proceedings of the 5Th International Conference MA 2001
, vol.2240
, pp. 1-14
-
-
Roth, V.1
-
128
-
-
0041103131
-
Mobile Agent Systems: What is Missing?
-
Cottbus, Germany, September 30
-
Rothermel, K., Hohl, F., and Radouniklis, N., “Mobile Agent Systems: What is Missing?”, Proceedings of International Working Conference on Distributed Applications and Interoperable Systems (DAIS’97), pp 111-124, Cottbus, Germany, September 30, 1997.
-
(1997)
Proceedings of International Working Conference on Distributed Applications and Interoperable Systems (DAIS’97)
, pp. 111-124
-
-
Rothermel, K.1
Hohl, F.2
Radouniklis, N.3
-
129
-
-
14044270782
-
UML Diagrams to Object Petri Net Models: An Approach for Modeling and Analysis
-
Chicago
-
Saldhana, J. A., and Shatz, S. M., “UML Diagrams to Object Petri Net Models: An Approach for Modeling and Analysis”, Proceedings of the Int. Conference on Software Engineering and Knowledge Engineering (SEKE), pp 103-110, Chicago, July 2000.
-
(2000)
Proceedings of the Int. Conference on Software Engineering and Knowledge Engineering (SEKE)
, pp. 103-110
-
-
Saldhana, J.A.1
Shatz, S.M.2
-
131
-
-
0031681561
-
Towards Mobile Cryptography
-
Sander, T., and Tschudin, C. F., “Towards Mobile Cryptography”, Proceedings of IEEE Symposium on Security and Privacy, pp 215-224, May 1998.
-
(1998)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 215-224
-
-
Sander, T.1
Tschudin, C.F.2
-
132
-
-
0003197918
-
Protecting Mobile Agents Against Malicious Hosts
-
Sander, T., and Tschudin, C. F., “Protecting Mobile Agents Against Malicious Hosts”, Mobile Agents and Security, Lecture Notes in Computer Science 1419, pp 44-60, 1998.
-
(1998)
Mobile Agents and Security, Lecture Notes in Computer Science
, vol.1419
, pp. 44-60
-
-
Sander, T.1
Tschudin, C.F.2
-
133
-
-
84957893114
-
On Software Protection via Function Hiding
-
LNCS
-
Sander, T., and Tschudin, C. F., “On Software Protection via Function Hiding”, Proceedings of the 2nd Workshop on Information Hiding, LNCS vol. 1525, pp 111-123, April 1998.
-
(1998)
Proceedings of the 2Nd Workshop on Information Hiding
, vol.1525
, pp. 111-123
-
-
Sander, T.1
Tschudin, C.F.2
-
134
-
-
0037510581
-
Authentication, Access Control, and Intrusion Detection
-
CRC Press, Boca Raton, FL
-
Sandhu, R. S., Samarati, P., “Authentication, Access Control, and Intrusion Detection”, The Computer Science and Engineering Handbook, CRC Press, Boca Raton, FL, 1997.
-
(1997)
The Computer Science and Engineering Handbook
-
-
Sandhu, R.S.1
Samarati, P.2
-
137
-
-
0001290617
-
A Survey of Theories for Mobile Agents
-
Serugendo, G. D. M., Muhugusa, M., and Tschudin, C. F., “A Survey of Theories for Mobile Agents”, World Wide Web Journal, special issue on Distributed World Wide Web Processing: Applications and Techniques of Web Agents, vol.1, no.3, pp 139-153, 1998.
-
(1998)
World Wide Web Journal, Special Issue on Distributed World Wide Web Processing: Applications and Techniques of Web Agents
, vol.1
, Issue.3
, pp. 139-153
-
-
Serugendo, G.D.M.1
Muhugusa, M.2
Tschudin, C.F.3
-
138
-
-
0032123179
-
Agent Cloning: An Approach to Agent Mobility and Resource Allocation
-
Shehory, O., Sycara, K., Chalasani, P., and Jha, S., “Agent Cloning: An Approach to Agent Mobility and Resource Allocation”, IEEE Communications, vol. 36, no. 7, pp 58-67, July 1998.
-
(1998)
IEEE Communications
, vol.36
, Issue.7
, pp. 58-67
-
-
Shehory, O.1
Sycara, K.2
Chalasani, P.3
Jha, S.4
-
139
-
-
0002529088
-
Mole-A Java Based Mobile Agent System
-
StraBer, M., Baumann, J., and Hohl, F., “Mole-A Java Based Mobile Agent System”, Proceedings of the ECOOP’96 workshop on Mobile Object Systems, July 1996.
-
(1996)
Proceedings of the ECOOP’96 Workshop on Mobile Object Systems
-
-
Straber, M.1
Baumann, J.2
Hohl, F.3
-
140
-
-
0009000142
-
Expressing Dynamics of Mobile Agent Systems Using Ambient Calculus
-
Stanski, P., and Zaslavsky, A., “Expressing Dynamics of Mobile Agent Systems Using Ambient Calculus”, Proceedings. Of IEEE Computer Society, pp 434-439, 1998.
-
(1998)
Proceedings. of IEEE Computer Society
, pp. 434-439
-
-
Stanski, P.1
Zaslavsky, A.2
-
141
-
-
0034205975
-
Multiagent Systems: A Survey from a Machine Learning Perspective
-
Stone, P., and Veloso, M., “Multiagent Systems: A Survey from a Machine Learning Perspective”, Autonomous Tobotics, vol. 8, no. 3, July 2000.
-
(2000)
Autonomous Tobotics
, vol.8
, Issue.3
-
-
Stone, P.1
Veloso, M.2
-
143
-
-
35048897235
-
-
NIST Special Publication 800-27
-
Stoneburner, G., Hayden, C, and Feringa, A., “Engineering Principles for Information Technology Security-A Baseline for Achieving Security”, NIST Special Publication 800-27, June 2001.
-
(2001)
Engineering Principles for Information Technology Security-A Baseline for Achieving Security
-
-
Stoneburner, G.1
Hayden, C.2
Feringa, A.3
-
145
-
-
0032304419
-
A Model of Mobile Agent Services Enhanced for Resource Restrictions and Security
-
Taka, T., Mizuno, T., and Watanabe, T., “A Model of Mobile Agent Services Enhanced for Resource Restrictions and Security”, Proceedings of 1998 International Conference on Parallel and Distributed Systems (ICPADS ‘98).
-
Proceedings of 1998 International Conference on Parallel and Distributed Systems (ICPADS ‘98)
-
-
Taka, T.1
Mizuno, T.2
Watanabe, T.3
-
146
-
-
26444498136
-
Extending Execution Tracing for Mobile Code Security
-
Tan, H. K., and Moreau, L., “Extending Execution Tracing for Mobile Code Security”, Proceedings of Second International Workshop on Security of Mobile MultiAgent Systems (SEMAS’2002), pp 51-59, 2002.
-
(2002)
Proceedings of Second International Workshop on Security of Mobile Multiagent Systems (SEMAS’2002)
, pp. 51-59
-
-
Tan, H.K.1
Moreau, L.2
-
147
-
-
84948187986
-
Trust Relationships in a Mobile Agent System
-
LNCS
-
Tan, H. K., and Moreau, L., “Trust Relationships in a Mobile Agent System”, Mobile Agents, LNCS, vol. 2240, pp 15-30, 2001.
-
(2001)
Mobile Agents
, vol.2240
, pp. 15-30
-
-
Tan, H.K.1
Moreau, L.2
-
148
-
-
0012364026
-
Securing Multi-Agent Platform Communication
-
Tan, J. J., Titkov, L., and Neophytou, C, “Securing Multi-Agent Platform Communication”, Working Notes Second Int’l Workshop on Security of Mobile Multiagent Systems, pp 66-72, 2002.
-
(2002)
Working Notes Second Int’l Workshop on Security of Mobile Multiagent Systems
, pp. 66-72
-
-
Tan, J.J.1
Titkov, L.2
Neophytou, C.3
-
149
-
-
0029733838
-
Mobile Agent Security and Telescript
-
Tardo, J., Valente, L., “Mobile Agent Security and Telescript”, Proceedings of IEEE COMPCON ‘96, pp 58-63, February 1996.
-
(1996)
Proceedings of IEEE COMPCON ‘96
, pp. 58-63
-
-
Tardo, J.1
Valente, L.2
-
150
-
-
85034837402
-
Elementary Net Systems
-
Thiagarajan, P. S., “Elementary Net Systems”, Petri Nets: Central Models and Their Properties, Lecture Notes in Computer Science, no. 254, pp 26-59, 1987.
-
(1987)
Petri Nets: Central Models and Their Properties, Lecture Notes in Computer Science
, vol.254
, pp. 26-59
-
-
Thiagarajan, P.S.1
-
151
-
-
0011749514
-
Secret Agents-a Security Architecture for the KQML Agent Communication Language
-
Baltimore, Maryland, USA
-
Thirunavukkarasu, C, Finin, T., and Mayfield, J., “Secret Agents-a Security Architecture for the KQML Agent Communication Language”, Proceedings of 4th International Conference on Information and Knowledge Management-Workshop on Intelligent Information Agents, Baltimore, Maryland, USA, Dec 1995.
-
(1995)
Proceedings of 4Th International Conference on Information and Knowledge Management-Workshop on Intelligent Information Agents
-
-
Thirunavukkarasu, C.1
Finin, T.2
Mayfield, J.3
-
152
-
-
0031232912
-
Programming Languages for Mobile Code
-
Thorn, T., “Programming Languages for Mobile Code”, ACM Computing Surveys, vol. 29, no. 3, pp 213-239, September 1997.
-
(1997)
ACM Computing Surveys
, vol.29
, Issue.3
, pp. 213-239
-
-
Thorn, T.1
-
155
-
-
0141925132
-
A Survey of Agent-Oriented Software Engineering
-
Trondheim, Norway
-
Tveit, A., “A Survey of Agent-Oriented Software Engineering”, NTNU Computer Science Graduate Student Conference, Norwegian University of Science and Technology, Trondheim, Norway, 2001.
-
(2001)
NTNU Computer Science Graduate Student Conference, Norwegian University of Science and Technology
-
-
Tveit, A.1
-
157
-
-
33646916374
-
Modeling Mobile Agents
-
Uhrmacher, A. M., Tyschler, P., and Tyschler, D., “Modeling Mobile Agents”, Proceedings of International Conference on Web-based Modeling & Simulation, 1998.
-
(1998)
Proceedings of International Conference on Web-Based Modeling & Simulation
-
-
Uhrmacher, A.M.1
Tyschler, P.2
Tyschler, D.3
-
158
-
-
0034288507
-
Modeling and Simulation of Mobile Agents
-
Uhrmacher, A. M., Tyschler, P., and Tyschler, D., “Modeling and Simulation of Mobile Agents”, Future Generation Computer Systems, vol. 17, no. 2, pp 107-118, October 2000.
-
(2000)
Future Generation Computer Systems
, vol.17
, Issue.2
, pp. 107-118
-
-
Uhrmacher, A.M.1
Tyschler, P.2
Tyschler, D.3
-
160
-
-
84957613488
-
Petri Nets as Token Objects-An Introduction to Elementary Object Nets
-
Valk, R., “Petri Nets as Token Objects-An Introduction to Elementary Object Nets”, Proceedings of 19th International Conference on Application and Theory of Petri Nets (ICATPN’98), Lecture Notes in Computer Science, vol. 1420, pp 1-25, 1998.
-
(1998)
Proceedings of 19Th International Conference on Application and Theory of Petri Nets (ICATPN’98), Lecture Notes in Computer Science
, vol.1420
, pp. 1-25
-
-
Valk, R.1
-
162
-
-
0003861085
-
-
Technical Report FBI-HH-B-226, pp 1-50, University of Hamburg, Department for Computer Science
-
Valk, R., “Relating Different Semantics for Object Petri Nets- Formal Proofs and Examples”, Technical Report FBI-HH-B-226, pp 1-50, University of Hamburg, Department for Computer Science, April 2000.
-
(2000)
Relating Different Semantics for Object Petri Nets- Formal Proofs and Examples
-
-
Valk, R.1
-
163
-
-
0039636654
-
-
Technical Report FBIHH- B-185/96, University of Hamburg, Computer Science Department
-
Valk, R., “On Processes of Object Petri Nets”, Technical Report FBIHH- B-185/96, pp 1-45, University of Hamburg, Computer Science Department, 1996.
-
(1996)
On Processes of Object Petri Nets
, pp. 1-45
-
-
Valk, R.1
-
165
-
-
85147077951
-
A Framework for Information Systems Design based on Object-Oriented Concepts and Petri Nets
-
Verkoulen, P. A.C., “A Framework for Information Systems Design based on Object-Oriented Concepts and Petri Nets”, Proceedings of CAiSE Workshop on Formal Methods, June 1994
-
(1994)
Proceedings of Caise Workshop on Formal Methods
-
-
Verkoulen, P.A.C.1
-
167
-
-
0002717089
-
Cryptographic Traces for Mobile Agents
-
Vigna, G., “Cryptographic Traces for Mobile Agents”, Mobile Agents and Security, Lecture Notes in Computer Science, vol. 1419, pp 137-153, 1998.
-
(1998)
Mobile Agents and Security, Lecture Notes in Computer Science
, vol.1419
, pp. 137-153
-
-
Vigna, G.1
-
168
-
-
16244416053
-
Towards a Calculus of Secure Mobile Computations
-
Chicago, Illinois
-
Vitek, J., and Castagna, G., “Towards a Calculus of Secure Mobile Computations”, Proceedings of Workshop on Internet Programming Languages, Chicago, Illinois, 1998.
-
(1998)
Proceedings of Workshop on Internet Programming Languages
-
-
Vitek, J.1
Castagna, G.2
-
169
-
-
84956985232
-
Seal: A Framework for Secure Mobile Computations
-
LNCS
-
Vitek, J., and Castagna, G., “Seal: A Framework for Secure Mobile Computations”, Internet Programming Languages, LNCS, vol. 1686, 1999.
-
(1999)
Internet Programming Languages
, vol.1686
-
-
Vitek, J.1
Castagna, G.2
-
171
-
-
0031599765
-
Security and Reliability in Concordia
-
Walsh, T., Paciorek, N., and Wong, D., “Security and Reliability in Concordia”, Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences, vol. 7, pp 44-53, January 1998.
-
(1998)
Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences
, vol.7
, pp. 44-53
-
-
Walsh, T.1
Paciorek, N.2
Wong, D.3
-
172
-
-
50249184615
-
Reliability through Strong Mobility
-
Wang, X., Hallstrom, J., and Baumgartner, G., “Reliability through Strong Mobility”, Proceedings of ECOOP workshop on Mobile Object Systems, June 2001.
-
(2001)
Proceedings of ECOOP Workshop on Mobile Object Systems
-
-
Wang, X.1
Hallstrom, J.2
Baumgartner, G.3
-
173
-
-
0000898130
-
Connectors for Mobile Programs
-
Wermelinger, M., and Fiadeiro, J., “Connectors for Mobile Programs”, IEEE Transactions on Software Engineering vol. 24, no. 1, pp 331-341, January 1998.
-
(1998)
IEEE Transactions on Software Engineering
, vol.24
, Issue.1
, pp. 331-341
-
-
Wermelinger, M.1
Fiadeiro, J.2
-
175
-
-
0012327478
-
-
General Magic
-
White, J. E., “Mobile Agents White Paper”, General Magic, http://www.genmagic.com/technology/techwhitepaper.html. 1998.
-
(1998)
Mobile Agents White Paper
-
-
White, J.E.1
-
176
-
-
0005824756
-
A Security Architecture for Electronic Commerce Applications
-
Kluwer Academic Publishers
-
Win, B. D., Bergh, J. V., Matthijs, F., Decker, B. D., and Joosen, W., “A Security Architecture for Electronic Commerce Applications”, Information Security for Global Information Infrastructures, pp 491-500, Kluwer Academic Publishers, 2000.
-
(2000)
Information Security for Global Information Infrastructures
, pp. 491-500
-
-
Win, B.D.1
Bergh, J.V.2
Matthijs, F.3
Decker, B.D.4
Joosen, W.5
-
177
-
-
84958953927
-
Concordia: An Infrastructure for Collaborating Mobile Agents
-
Lecture Notes in Computer Science
-
Wong, D., Pacoprek, N., Walsh, T., DiCelie, J., Young, M., and Peet, B., “Concordia: An Infrastructure for Collaborating Mobile Agents”, Proceedings of the First International Workshop on Mobile Agents (MA ‘97), vol. 1219 or Lecture Notes in Computer Science, pp 86-97, 1997.
-
(1997)
Proceedings of the First International Workshop on Mobile Agents (MA ‘97)
, vol.1219
, pp. 86-97
-
-
Wong, D.1
Pacoprek, N.2
Walsh, T.3
Dicelie, J.4
Young, M.5
Peet, B.6
-
179
-
-
0034504563
-
Modeling Mobile Agent Systems with High Level Petri Nets
-
Xu, D., and Deng, Y., “Modeling Mobile Agent Systems with High Level Petri Nets”, Proceedings of IEEE International Conference on Systems, Man, and Cybernetics, October 2000.
-
(2000)
Proceedings of IEEE International Conference on Systems, Man, and Cybernetics
-
-
Xu, D.1
Deng, Y.2
-
180
-
-
0037250973
-
A Formal Architectural Model for Logical Agent Mobility
-
Xu, D, Yin, J., Deng, Y. and Ding, J., “A Formal Architectural Model for Logical Agent Mobility”, IEEE Transactions on Software Engineering, vol. 29, no. 1, pp 31-45, January 2003.
-
(2003)
IEEE Transactions on Software Engineering
, vol.29
, Issue.1
, pp. 31-45
-
-
Xu, D.1
Yin, J.2
Deng, Y.3
Ding, J.4
-
181
-
-
0037252918
-
A Framework for Model-Based Design of Agent-Oriented Software
-
Xu, H. and Shatz, S. M., “A Framework for Model-Based Design of Agent-Oriented Software”, IEEE Transactions on Software Engineering, vol. 29, no. 1, pp 15-30, January 2003.
-
(2003)
IEEE Transactions on Software Engineering
, vol.29
, Issue.1
, pp. 15-30
-
-
Xu, H.1
Shatz, S.M.2
-
182
-
-
0003165915
-
Modeling and Validation of Mobile Agents on the Web
-
Yoo, M.-J., Merlat, W. and Briot, J.-P., “Modeling and Validation of Mobile Agents on the Web”, Proceedings of the International Conference on the Web-based Modeling & Simulation, vol. 30, no. 1, pp 23-28, January 1998.
-
(1998)
Proceedings of the International Conference on the Web-Based Modeling & Simulation
, vol.30
, Issue.1
, pp. 23-28
-
-
Yoo, M.-J.1
Merlat, W.2
Briot, J.-P.3
-
183
-
-
85037529240
-
Security Requirements for Mobile Agents in Electronic Markets
-
Hamburg, Germany
-
Zapf, M., Muller, H., and Geihs, K., “Security Requirements for Mobile Agents in Electronic Markets”, Trends in Distributed Systems for Electronic Commerce (TrEC ‘98), Hamburg, Germany, June 1998.
-
(1998)
Trends in Distributed Systems for Electronic Commerce (Trec ‘98)
-
-
Zapf, M.1
Muller, H.2
Geihs, K.3
-
185
-
-
0034297663
-
A., “Modeling and Performance Analysis Using Extended Fuzzy-Timing Petri Nets for Networked Virtual Environments”
-
Zhou, Y., Murata, T., and DeFanti, T. A., “Modeling and Performance Analysis Using Extended Fuzzy-Timing Petri Nets for Networked Virtual Environments”, IEEE Transactions on Systems, Man, and Cybernetics-PartB: Cybernetics, vol. 30, no. 5, October 2000.
-
(2000)
IEEE Transactions on Systems, Man, and Cybernetics-Partb: Cybernetics
, vol.30
, Issue.5
-
-
Zhou, Y.1
Murata, T.2
Defanti, T.3
-
187
-
-
85147055510
-
NetCASE-a Petri Net based Method for Database Application Design and Generation
-
University of Koblenz
-
NetCASE-a Petri Net based Method for Database Application Design and Generation, Research Report 11-95, University of Koblenz.
-
Research Report 11-95
-
-
|