1 |
A. Conadi, R Montanah, C. Stefanelli, 'Mobile Agents Protection in the Internet Environment,' Proc. the 23th Annual International Computer Softwwe & Applications Conference, pp. 80-85, 1999
|
2 |
U. G. Wilhelm, S. M. Staamann, L. Buttyan. 'A Pessimistic Approach to Trust in Mobile Agent Platfoms,' IEEE Internet Computing, 4(5), pp. 40-48, 2000
DOI
ScienceOn
|
3 |
Y. Ding, H. Petersen, 'A New Approach for Delegation using Hierarchical Delegadon Token s,' Proc. the 2nd Conf. on Computer & Communications Secuity, pp. 128-143, 1996
|
4 |
B. Lampson, M. Abadi, M. Bunows, B Wobber, 'Authentication in Distiibuted Systems: Iheoiy and Practice,' Proc. the 13th ACM Symp. on Operating Systems Principles, pp.165-182, 1991
|
5 |
N. Li, B. Grosof, J. Feigenbaum. 'A Practically Implementable and Tractable Delegation Logic,' Proc. 2000 IEEE Sym. on Security & Privacy, pp. 27-42, 2000
|
6 |
W. A. Jansen, 'Countenneasures for Mobile Agent Secunty, Computer Communications,' 2000
|
7 |
B. C. Neuman, 'Ptoxy-Based Authonzadon and Accounting for Distributed Systems,' Proc. the 13th International Conference on Distributed Computing Systems, pp. 283-291, 1993
|
8 |
W. M. Farmer, J. D. Guttman, V. Swarup, 'Security for Mobile Agents: Issues and Requiiements,' Proc. the 19th National Information Systems Security Conference, pp. 591-597, 1996
|
9 |
B. Crispo, 'Delegation Protocols for Electronic Commerce,' Proc. the 6th IEEE Sym. on Computers & Coimmmications, pp. 674-679, 2001
DOI
|
10 |
C. G. Harrison, D. M. Chess, A. Kershenbaum, 'Mobile Agents: Are they a good idea?,' Research Report, IBM Research Division T. J. Watson Research Center, 1995
|
11 |
S. Berkovits, J. D. Guttman, V. Swarup, 'Authentication for Mobile Agents,' LNCS 1419, pp. 114-136, 1998
|
12 |
G. Vogt, 'Delegadon of Tasks and Rights,' Proc. the 12th Annual IFIP/1EEE International Workshop on Distributed Systems: Operations & Mamgement, pp. 327-337, 2001
|
13 |
V. Vardharajan, P. Allen, S. Black, 'An Analysis of the Proxy Problem in Distributed Systems,' Proc. 1991 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 255-175, 1991
|
14 |
M. Abadi, M. Burrows, B. Lampson, G. Plotkin, 'A Calculus for Access Control in Disdibuted Systems,' ACM Transactions on Programming Language and Systems, 15(4), pp. 706.734, 1993
DOI
ScienceOn
|