1 |
U. Wilhelm, S. Stamann and L. Buttyan, 'A pessimistic approach to trust in mobile agent platforms,' IEEE Internet Computing, Vol.4, No.5, pp.40-48, 2000
DOI
ScienceOn
|
2 |
C. Harrison, D. Chess and A. Kershenbaum, 'Mobile Agents : Are they a good idea?,' Research Report 1987, IBM Research Division, 1994
|
3 |
W. Jansen, 'Countermeasures for mobile agent security,' Computer Communications : Special Issue on Advances in Research and Application of Network Security, 2000
DOI
ScienceOn
|
4 |
Y. Ding and H. Petersen, 'A new approach for delegation using hierarchical delegation tokens,' Proc. 2nd Conference on Computer and Communications Security, pp.128-143, 1996
|
5 |
S. Berkovits, J. Guttman and V. Swamp, 'Authentication for mobile agents,' Lecture Notes in Computer Science #1419 : Mobile Agents and Security, Springer-Verlag, pp. 114-136, 1998
|
6 |
W. Farmer, J. Guttman and V. Swarup, 'Security for mobile agents : issues and requirements, Computer Communications : Special Issue on Advances in Research and Application of Network Security, 1996
|
7 |
A. Corradi, R. Montanari and C. Stefanelli, 'Mobile agents protection in the internet environment,' Proc. 23th Annual International Computer Software and Applications Conference, pp.80-85, 1999
DOI
|
8 |
B. Lampson, M. Abadi, M. Burrows and E. Wobber, 'Authentication in distributed systems : theory and practice,' Proc. 13th ACM Symposium on Operating Systems Principles, pp.165-182, 1991
|
9 |
G. Vogt, 'Delegation of tasks and rights,' Proc. 12th Annual IFIP/IEEE International Workshop on Distributed systems : Operations & Management, pp.327-337, 2001
|
10 |
M. Abadi, M. Burrows, B. Lampson and G. Plotkin, 'A calculus for access control in distributed systems,' ACM Transactions on Programming Language and Systems, Vol.15, No.4, pp.706-734, 1993
DOI
ScienceOn
|