Information Technology Reference
In-Depth Information
Ghezzi, C. & Vigna, G. (1997, April). Mobile code paradigms and technologies: A case study. In K.
Rothermet, R. Popescu-Zeletin (Eds.), Mobile Agents, First International Workshop, MA'97, Proceed-
ings, LNCS 1219 (pp. 39-49), Berlin, Germany. Springer.
Greenberg, M. S., Byington, J. C., & Harper, D. G. (1998). Mobile agents and security. IEEE Commu-
nications Magazine, 367 .
Hamidi, H. & Mohammadi, K. (2005, March). Modeling and evaluation of fault tolerant mobile agents
in distributed systems. In Proceedings of the 2nd IEEE Conference on Wireless & Optical Communica-
tions Networks (WOCN2005) (pp. 91-95).
Hohl, F. (1998a) Time limited Blackbox security: Protecting mobile agents from malicious hosts. In G.
Vigna (Ed.), Mobile agents and security, LNCS 1419 (pp. 92-113). Springer.
Hohl, F. (1998b). A model of attacks of malicious hosts against mobile agents. In Fourth Workshop on
Mobile Object Systems (MOS'98): Secure Internet Mobile Computations . Retrieved from http://cuiwww.
unige.ch/~ecoopws/ws98/papers/hohl.ps
Hohl, F. (1998c). A model of attacks of malicious hosts against mobile agents. In Proceedings of the
ECOOP Workshop on Distributed Object Security and 4th Workshop on Object Systems : Secure Internet
mobile computations (pp. 105-120), Inria, France.
Izatt, M., Chan, P., & Brecht, T. (1999, June). Agents: Towards an environment for parallel, distributed and
mobile Java applications. In Proceedings of the 1999 ACM Conference on Java Grande (pp. 15-24).
Jonsson, E. (1997). A quantitative model of the security intrusion process based on attacker behavior.
IEEE Transactions on Software Engineering, 23 (4).
Park, T., Byun, I., Kim, H. & Yeom, H. Y. (2002). The performance of checkpointing and replication
schemes for fault tolerant mobile agent systems. In Proceedings of the 21st IEEE Symposium on Reli-
able Distributed Systems .
Pleisch, S. & Schiper, A. (2000). Modeling fault: Tolerant mobile agent execution as a sequence of agree
problems. In Proceedings of the 19th IEEE Symposium on Reliable Distributed Systems (pp. 11-20).
Pleisch, S. & Schiper, A. (2001, July). FATOMAS — A Fault-Tolerant Mobile Agent System based on
the agent-dependent approach. In Proceedings of the 2001 International Conference on Dependable
Systems and Networks (pp. 215-224).
Pleisch, S. & Schiper, A. (2003). Fault-tolerant mobile agent execution. IEEE Transactions on Comput-
ers, 52 (2).
Sander, T. & Tschudin, C. F. (1998). Protecting mobile agents against malicious hosts. In G. Vigna (Ed.),
Mobile agents and security, LNCS 1419 (pp. 44-60). Springer.
Schneier, B. (1996). Applied cryptography . Wiley.
Shiraishi, M., Enokido, T. & Takizawa, M. (2003). Fault-tolerant mobile agents in distributed objects
systems. In Proceedings of the Ninth IEEE Workshop on Future Trends of Distributed Computer Sys-
tems (FTDCS, 03) (pp. 11-20).
Search WWH ::




Custom Search