Spy Agents: Evaluating Trust in Remote Environments.

作者: Georgios Kalogridis , Chris J. Mitchell , Gary Clemo

DOI:

关键词:

摘要:

参考文章(16)
Wayne Jansen, Tom Karygiannis, Mobile Agent Security National Institute of Standards and Technology (U.S.). ,(1999) , 10.6028/NIST.SP.800-19
N. Borselius, Security for agent systems and mobile agents Security for Mobility. pp. 287- 304 ,(2004) , 10.1049/PBTE051E_CH12
Kwok-Wai Cheung, Sau-Koon Ng, Protecting Mobile Agents Against Malicious Hosts by Intention Spreading. parallel and distributed processing techniques and applications. pp. 725- 729 ,(1999)
Bennet S. Yee, Using Secure Coprocessors ,(1994)
David Chess, Colin Harrison, Aaron Kershenbaum, Mobile Agents: Are They a Good Idea? international workshop on mobile object systems. pp. 25- 45 ,(1996) , 10.1007/3-540-62852-5_4
Jack Davidson, John Knight, Jonathan Hill, Chenxi Wang, Software Tamper Resistance: Obstructing Static Analysis of Programs University of Virginia. ,(2000)
Colin Boyd, Anish Mathuria, Douglas Stebila, Protocols for Authentication and Key Establishment ,(2003)
M. L. Schoffstall, M. Fedor, J. Davin, J. D. Case, Simple Network Management Protocol (SNMP) RFC. ,vol. 1098, pp. 1- 34 ,(1989)
T. Sander, C.F. Tschudin, Towards mobile cryptography ieee symposium on security and privacy. pp. 215- 224 ,(1998) , 10.1109/SECPRI.1998.674837
Eugene H Spafford, Diego Zamboni, Intrusion detection using autonomous agents recent advances in intrusion detection. ,vol. 34, pp. 547- 570 ,(2000) , 10.1016/S1389-1286(00)00136-5