Mutual protection of co-operating agents
Secure Internet programming
A Chinese wall security model for decentralized workflow systems
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Mobile agent security based on payment
ACM SIGOPS Operating Systems Review
Software—Practice & Experience - Special issue: Mobile agent systems
Bytecode verification on Java smart cards
Software—Practice & Experience
The JavaSeal Mobile Agent Kernel
Autonomous Agents and Multi-Agent Systems
Fine-Grain Access Control for Securing Shared Resources in Computational Grids
IPDPS '02 Proceedings of the 16th International Parallel and Distributed Processing Symposium
A Secure Group Solution for Multi-Agent EC System
IPDPS '01 Proceedings of the 15th International Parallel & Distributed Processing Symposium
Encrypting Java Archives and Its Application to Mobile Agent Security
Agent Mediated Electronic Commerce, The European AgentLink Perspective.
Uncheatable Distributed Computations
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
A Java Middleware for Guaranteeing Privacy of Distributed Tuple Spaces
FIDJI '01 Revised Papers from the International Workshop on Scientific Engineering for Distributed Java Applications
A Secure Route Structure for Information Gathering Agent
PRIMA '00 Proceedings of the Third Pacific Rim International Workshop on Multi-Agents: Design and Applications of Intelligent Agents
Fairy in a Smart IC Card: Interfacing People, Town, and Digital City
Digital Cities, Technologies, Experiences, and Future Perspectives [the book is based on an international symposium held in Kyoto, Japan, in September 1999
On-Card Bytecode Verification for Java Card
E-SMART '01 Proceedings of the International Conference on Research in Smart Cards: Smart Card Programming and Security
Evaluating the Security of Three Java-Based Mobile Agent Systems
MA '01 Proceedings of the 5th International Conference on Mobile Agents
Java Bytecode Verification: An Overview
CAV '01 Proceedings of the 13th International Conference on Computer Aided Verification
Combine concept of agent and service to build distributed object-oriented system
Future Generation Computer Systems - Special section: Selected papers from the TERENA networking conference 2002
Security Requirements for Management Systems Using Mobile Agents
ISCC '00 Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
A Case For Grid Computing On Virtual Machines
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
A security framework for reflective Java applications
Software—Practice & Experience
Some research on componentware frameworks based on mobile agent technology
ACM SIGSOFT Software Engineering Notes
Approaches to fault-tolerant and transactional mobile agent execution---an algorithmic view
ACM Computing Surveys (CSUR)
Chinese wall security for decentralized workflow management systems
Journal of Computer Security - Special issue on ACM conference on computer and communications security, 2001
A distributed content-based search engine based on mobile code
Proceedings of the 2005 ACM symposium on Applied computing
Guarding security sensitive content using confined mobile agents
Proceedings of the 2007 ACM symposium on Applied computing
An adaptive security model using agent-oriented MDA
Information and Software Technology
Agents Jumping in the Air: Dream or Reality?
IWANN '09 Proceedings of the 10th International Work-Conference on Artificial Neural Networks: Part I: Bio-Inspired Systems: Computational and Ambient Intelligence
Algorithms and theory of computation handbook
Computational REST meets Erlang
TOOLS'11 Proceedings of the 49th international conference on Objects, models, components, patterns
Searching for high-value rare events with uncheatable grid computing
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Hi-index | 0.00 |