Roth, V.: Obstacles to the Adoption of Mobile Agents. In: Proc. of the IEEE Int’l. Conf. on Mobile Data Management, January 2004, pp. 296–297. IEEE Computer Society Press, Los Alamitos (2004)
CrossRef
Google Scholar
Ong, S.K., Sun, W.W.: Application of mobile agents in a web-based real-time monitoring system. The International Journal of Advanced Manufacturing Technology, 33–40 (2003)
Google Scholar
Aye, T., Tun, K.M.L.: A collaborative mobile agent-based workflow system. In: Proc. 6th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT, November 2005, pp. 59–65 (2005)
Google Scholar
San, K.M., Thant, H.A., Aung, S.S., Tun, K.M.L., Naing, T.T., Thein, N.L.: Mobile agent based collaborative learning system. In: Proc. 6th Asia-Pacific Symposium on Information and Telecommunication Technologies, APSITT, November 2005, pp. 83–88 (2005)
Google Scholar
Huang, J., Liu, D.-Y., Yang, B.: Online autonomous auction model based on agent. In: Proc. of 2004 International Conference on Machine Learning and Cybernetics, vol. 1, pp. 89–94 (2004)
Google Scholar
Jansen, W.: Intrusion detection with mobile agents. Computer Communications 25 (2002)
Google Scholar
Gray, R.S., Kotz, D., Cybenko, G., Rus, D.: D’Agents: Security in a Multiple-Language, Mobile-Agent System. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 154–187. Springer, Heidelberg (1998)
CrossRef
Google Scholar
Seleznyov, A., Ahmed, M.O., Hailes, S.: Agent-based Middleware Architecture for Distributed Access Control. In: Proc. of the 22nd Int’l. Multi-Conf. on Applied Informatics: Artificial Intelligence and Applications, pp. 200–205 (2004)
Google Scholar
The National Security Agency: The SELinux Project (2005),
http://selinux.sourceforge.net/
Trusted Computing Group: Trusted Computing Group Hompage (2005),
https://www.trustedcomputinggroup.org/home
Stallings, W.: Cryptography and Network Security: Principles and Practices, 4th edn. Prentice-Hall, Englewood Cliffs (2006)
Google Scholar
Pathak, V., Iftode, L.: Byzantine fault tolerant public key authentication in peer-to-peer systems. Computer Networks (Special issue on Management in Peer-to-Peer Systems: Trust, Reputation and Security) 50(4) (2006)
Google Scholar
McCarty, B.: SELinux NSA’s Open Source Security Enhanced Linux, 1st edn. OŔeilly Media, Inc., Sebastobol (2004)
Google Scholar
Jochen, M., Marvel, L., Pollock, L.: A Framework for Tamper Detection Marking of Mobile Applications. In: Proc. of the 14th Int’l. Symp. on Software Reliability Engineering, pp. 143–152 (2003)
Google Scholar
Page, J., Zaslavsky, A., Indrawan, M.: Countering Security Vulnerabilities in Agent Execution Using a Self Executing Security Examination. In: Proc. of the 3rd Int’l Joint Conf. on Autonomous Agents and Multiagent Systems, pp. 1486–1487 (2004)
Google Scholar
Hohl, F.: A Framework to Protect Mobile Agents by Using Reference States. In: Proc. of the 20th IEEE Int’l. Conf. on Distributed Computing Systems, pp. 410–419 (2000)
Google Scholar
Farmer, W., Guttman, J., Swarup, V.: Security for Mobile Agents: Authentication and State Appraisal. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol. 1146, pp. 118–130. Springer, Heidelberg (1996)
Google Scholar
Vigna, G.: Cryptographic Traces for Mobile Agents. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 137–153. Springer, Heidelberg (1998)
CrossRef
Google Scholar
Cabri, G., Leonardi, L., Zambonelli, F.: MARS: A Programmable Coordination Architecture for Mobile Agents. IEEE Internet Computing 4(4), 26–35 (2000), doi:10.1109/4236.865084
CrossRef
Google Scholar
Suri, N., Bradshaw, J.M., Breedy, M.R., Groth, P.T., Hill, G.A., Jeffers, R., Mitrovich, T.S., Pouliot, B.R., Smith, D.S.: NOMADS: Toward a Strong and Safe Mobile Agent System. In: Proc. of the 4th Int’l. Conf. on Autonomous Agents, pp. 163–164 (2000)
Google Scholar
Karjoth, G., Lange, D.B., Oshima, M.: A Security Model for Aglets. IEEE Internet Computing 1(4), 68–77 (1997)
CrossRef
Google Scholar
Karnik, N.M., Tripathi, A.R.: Security in the Ajanta mobile agent system. Software—Practice and Experience 31(4), 301–329 (2001)
MATH
CrossRef
Google Scholar
Marques, P., Santos, N.: The Security Architecture of the M&M Mobile Agent Framework. In: Proc. of the SPIE’s Int’l. Symp. on The Convergence of Information Technologies and Communications (2001)
Google Scholar