References
- P. Dasgupta, L. E. Moser, P. M. Melliarsmith, 'MagNet:Mobile Agents for Networked Electronic Tracing', IEEE Transaction on Knowledge and Data Engineering, Vol. 11, No.4, July, 1991
- A. Villazon and W.Binder, 'Portable Resource Reification in Java-based Mobile Agent Systems', In Mobile Agents : Proc. of the 5th International Conference, Number 2240 in LNCS, Springer-Verlag, Altanta, USA, 2001
- H. K. Tan, L. Moreau, 'Extending Execution Tracing for Mobile Code Security', In Proc. of the 2nd International Workshop on Security in Mobile Miti-Agent Systems, associated to AAMAS-2002, Bologna, Italy, July, 2002
- F. Hohl, 'Time Limited Blackbox Security : Protecting Mobile Agents from Malicious Hosts', G. Vigna (Ed), in Proceeding of Mobile Agents and Security, Springer-Verlag, Lecture Notes in Computer Science No.1419, pp.92-11, 1998 https://doi.org/10.1007/3-540-68671-1_6
- T. Taka, T. Mizuno, T. Watanabe, 'A Model of Mobile Agent Services' in enhanced for the International Conference on Parallel and Distributed Systems, pp. 274-281, 1998
- C. Raibulet, C. Demartini, 'Mobile Agent Technology for the Management of Distributed System-a Case Study', in Journal of Computer Networks Vol.34, pp.823-830, 2000 https://doi.org/10.1016/S1389-1286(00)00153-5
- V. Roth, 'Secure Recording of Itineraries through Co-operation Agents', in Proceeding of the ECOOP Workshop on Distributed Object Security and 4th Workshop on Mobile Object Systems: Secure Internet Mobile Computations, pp.147-154, INRIA, Frince, 1998
- J. Alesheimer, C. Cachin, J. Camenisch, G. Karjoth, ' Crytographic Security for Mobile Code', In Proc. IEEE Symposium on Security and Privacy(S&P 2001), pp.2-11, may, 2001
- H. Reiser, G. Vogt, 'Security Requirments for Management System using Mobile Agents', In the Proc. of the 5th IEEE Symposium on Computer and Communication:ISCC 2000, Antibes, France, July, 2000
- C. R. Jung, J. G. Koh. 'Mobile Agent Protection Scheme through Execution Tracing of Agent Code and Status', in the Journal of KICS, Korea, Vol.28, No.7C, pp.743-751, 2003
- T. Sander, C. Tschudin, 'Towards Mobile Cryptography', In Proc. of the 1998 IEEE Symposium on Security and Privacy, Oakland, CA, May, 1998
- G. Vigna, 'Cryptographic Traces for Mobile Agents', Mobile Agents and Security, pp.137-153, LNCS1419, Springer -verlag, 1998