Authentication and authenticated key exchanges
Designs, Codes and Cryptography
The Java Language Specification
The Java Language Specification
Itinerant Agents for Mobile Computing
IEEE Communications Surveys & Tutorials
StratOSphere: mobile processing of distributed objects in Java
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
Proceedings of the 14th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
Mobility and Extensibility in the StratOSphere Framework
Distributed and Parallel Databases - Special issue on mobile data management and applications
Security enhanced mobile agents
Proceedings of the 7th ACM conference on Computer and communications security
ACM Computing Surveys (CSUR)
Security in mobile agent system: problems and approaches
ACM SIGOPS Operating Systems Review
Software—Practice & Experience - Special issue: Mobile agent systems
Case Studies in Security and Resource Management for Mobile Object Systems
Autonomous Agents and Multi-Agent Systems
IEEE Internet Computing
Agent-Mediated Secure Electronic Transaction for Online Interdependent Purchases
E-Commerce Agents, Marketplace Solutions, Security Issues, and Supply and Demand
Mobile Agent Security - Issues and Directions
IS&N '99 Proceedings of the 6th International Conference on Intelligence and Services in Networks: Paving the Way for an Open Service Market
Cryptographic Traces for Mobile Agents
Mobile Agents and Security
Authentication for Mobile Agents
Mobile Agents and Security
D'Agents: Security in a Multiple-Language, Mobile-Agent System
Mobile Agents and Security
Mobile Agents and Security
Mobile Telescript Agents and the Web
COMPCON '96 Proceedings of the 41st IEEE International Computer Conference
Knowbot Programming: system support for mobile agents
IWOOOS '96 Proceedings of the 5th International Workshop on Object Orientation in Operating Systems (IWOOOS '96)
Efficient application migration under compiler guidance
LCTES '05 Proceedings of the 2005 ACM SIGPLAN/SIGBED conference on Languages, compilers, and tools for embedded systems
Sub-operating systems: a new approach to application security
EW 10 Proceedings of the 10th workshop on ACM SIGOPS European workshop
Agent Tcl: a flexible and secure mobile-agent system
TCLTK'96 Proceedings of the 4th conference on USENIX Tcl/Tk Workshop, 1996 - Volume 4
The multispace: an evolutionary platform for infrastructural services
ATEC '99 Proceedings of the annual conference on USENIX Annual Technical Conference
Trust-based security for wireless ad hoc and sensor networks
Computer Communications
A Property-Dependent Agent Transfer Protocol
Trust '09 Proceedings of the 2nd International Conference on Trusted Computing
Evolution of ubiquitous autonomous agents
International Journal of Ad Hoc and Ubiquitous Computing
Spatial security policies for mobile agents in a sentient computing environment
FASE'03 Proceedings of the 6th international conference on Fundamental approaches to software engineering
Integrating the Havana agent platform into the existing web infrastructure
International Journal of Wireless and Mobile Computing
Mobile agent code updating and authentication protocol for code-centric RFID system
NETWORKING'11 Proceedings of the IFIP TC 6th international conference on Networking
SP 800-19. Mobile Agent Security
SP 800-19. Mobile Agent Security
Countermeasures for mobile agent security
Computer Communications
Intrusion detection with mobile agents
Computer Communications
Security Issues in Mobile Agent Applications
International Journal of Agent Technologies and Systems
Artificial immune system based mobile agent platform protection
Computer Standards & Interfaces
Hi-index | 0.00 |
Telescript is a software technology for building distributed applications using the mobile agent paradigm. Telescript mobile agents are migrating processes capable of being executed on any Telescript service host. This paper describes the safety and security features of first-generation Telescript networks. These features are sufficient for deploying early mobile agent applications, subject to certain operating restrictions. The ultimate goal is the safe hosting of arbitrary, previously unseen programs, or "programming the network."