1 |
D.C, Chess, C. Harrison, A. Kershenbaum, 'Mobile Agents:Are They a Good Idea?', IBM Research Report, 1995
|
2 |
R. S. Gray, 'Agent Tcl: A flexible and secure mobile-agent system', Proceedings of Fourth Annual Usenix Tcl', Workshop, pp. 9-23, 1996
|
3 |
Stefan Funfrocken, 'Protecting Mobile Web-Commerce Agents with Smartcard', Mobile Security Agent, LNCS 1419, 1999, springer, pp. 44-64, Giovanni Vigna (Ed.)
|
4 |
Jae-Kyoung Park, Yoo-Hun Won, 'Protecting Mobile Agent with VPN', 2001. 6, 情報保護學會論文誌 第 11券 第3號
과학기술학회마을
|
5 |
F. Hohl, 'A model of Attacks of Malicious Hosts Against Mobile Agents', presented at 4th Workshop on Mobile Object Systems Secure Internet Mobile Computations, France, 1998
|
6 |
Jian Tang, Jari Veijalainen, 'Using Agents to Improve Security and Convenience in mobile E-Commerce', Proceedings of the 34th Hawaii International Conference on System Science-2001, 2001 IEEE
|
7 |
Crystaliz Inc., General Magic Inc., GMD Fokus, IBM Corp., 'Mobile Agent Facility Specipication', Joint Submission Supported by the Open Group, OMG TC Document, November 1997
|
8 |
Panayiotis Kotzanikolaou, 'Secure Stansactions with Mobile Agents in Hostile Environments', pp. 193-202, 1999 IEEE
|
9 |
Antonio Corradi, Rebecca Montanari, Cesare Stefanelli, 'Security Issues In Mobile Agent Technology', http://www.lia.deis.unibo.it/Software/SOMA
|
10 |
Niranjan Suri, 'NOMADS:Toward a Strong and Safe Mobile Agent System', Agent 2000 Barcelona Spain, pp. 163-164, ACM 2000
DOI
|
11 |
Hartmut Vogler, Thomas Kunkelmann, Marie-Louise Moschgath, 'An Approach for Mobile Agent Security and Fault Tolerance using Distributed Transactions', Proceedings of the 1997 International Conference on Parallel and Distributed Systems, pp. 268-274, 1997 IEEE
DOI
|
12 |
S. Kent, R. Atkinson, 'IP Encapsulating Security Payload(ESP)', November 1998, RFC 2406, available at http://www.cis.ohio-state.edu/Service/rfc/rfc-text/rfc2406.txt
|
13 |
D. Maughan, M. Schertler, M. Schneider, J. Turner, 'Internet Security Association and Key Management Protocol (ISAKMP)', November 1998, RFC 2408, available at http://www.cis.ohio-state.edu/Service/rfc/rfc-text/rfc2408.txt
|
14 |
D. Harkins, D. Carrel, 'The Internet Key Exchange (IKE)', November 1998, RFC 2409, available at http://www.cis.ohio-state.edu/Service/rfc/rfc-text/rfc2409.txt
|
15 |
S. Kent, R. Atkinson, 'IP Authentication Header', November 1998, RFC 2402, available at http://www.cis.ohiostate.edu/Service/rfc/rfc-text/rfc2402.txt
|
16 |
Casey Wilson, Peter Doak, 'Creating and Implementing Virtual Private Network', pp. 379-418, 2000, CORIOLIS (Ed.)
|