|
[AGENT_TCL] http://www.cs.dartmouth.edu/~agent [AGLET] http://www.trl.ibm.co.jp/aglets [AJANTA] http://www.cs.umn.edu/Ajanta [Akl83CR] S. G. Akl and P. D. Taylor, “Cryptographic solution to a problem of access control in a hierarchy”, ACM Transaction on Computer System, Vol. 1, No. 3, pp. 239-247, August 1983. [ARA] http://www.uni-kl.de/AG-Nehmer/Projekte/Ara [BAR83NU] A. G. Barto, R. S. Sutton, C. W. Anderson, “Neuron like elements that can solve difficult learning control problems”, IEEE Transactions on Systems, Man and Cybernetics, Vol. SMC-13, pp. 835-846, 1983. [BIR85MA] A. Birrell, “Secure communication using remote procedure calls”, ACM Transactions on Computer Systems, vol.3, pp.1-141, February 1985. [CONCORDIA] http://www.meitca.com/HSL/Projects/Concordia [COR99MA] A. Corradi, R. Montanari, C. Stefanelli, “Mobile agents integrity in e-commerce applications”, in 19th IEEE International Conference on Distributed Computing Systems Workshops on Electronic Commerce and Web-based Applications/Middleware, pp.59-64, 1999. [COR99MA2] A. Corradi, R. Montanari, C. Stefanelli, “Mobile agents protection in the internet environment”, in The Twenty-Third Annual International Computer Software and Applications Conference (COMPSAC''99), pp.80-85, 1999. [COR99MA1] A. Corradi, R. Montanari, C. Stefanelli, “Security issues in mobile agent technology”, in 7th IEEE Workshop on Future Trends of Distributed Computing Systems, pp.3-8, 1999. [EDJ98MA] G. Edjlali, A. Acharya, V. Chaudhary, “History-based access control for mobile code”, in Fifth ACM Conference on Computer and Communication Security, pp.38-48, 1998. [FAR96MA] W. M. Farmer, J. D. Guttman, V. Swarup, “Security for mobile agents: Issues and requirements”, in 19th National Information Systems Security Conference, pp.591-587, October 1997. [FIPA] http://www.fipa.org/spec/FIPA98.html [FOR92] W. Ford, “Security techniques for network management”, Advanced Communications and Applications for High Speed Networks, pp.133-149, 1992. [FRA96MA] S. Franklin and A. Graesser, ”Is it an agent or just a program”, in The Third Internation Workshop on Agent Theories, architectures, and languages, 1996. [GLE99MA] P. Gleeson, O. Weissmann, “Secure access control in a TINA environment containing mobile agents”, in Telecommunications Information Networking Architecture Conference (TINA ''99}, pp.177-179, 1999. [GON97] L. Gong, “New security architectural directions for java”, in IEEE COMPCON''97, 1997. [GON97MA] Li Gong, “Java security: Present and near future”, IEEE Micro, vol.17, May/June 1997. [GRE98MA] M. S. Greenberg, J. C. Byington, D. G. Harper, “Mobile agents and security”, IEEE Communications Magazine, vol. 36, pp. 76-85, July 1998. [HOH98MA] F. Hohl, “A model of attacks malicious hosts against mobile agents”, in 4th Workshop on Mobile Object Systems: Secure Internet Mobile Computations, 1998. [MASIF] Crystaliz Inc., General Magic Inc., GMD Fokus, IBM Corp., “Mobile agent facility specification”, Joint Submission Supported by the Open Group, OMG TC Document, November 1997. [MOLE] http://www.informatik.uni-stuttgart.de/ipvt/vs/ projekte/mole.html [JAVA] http://www.java.soft.com [JEN98MA] N. R. Jennings, K. Sycara, and M. Wooldridge, “A roadmap of agent research and development”, Autonomous Agents and Multi-Agent Systems, vol. 1, pp. 7-38, 1998. [KAR99MA] G. Karjoth, N. Asokan, C. Gulcu, “Protecting the computation result of free-roaming agents”, in The 2th International Workshop on Mobile Agent, 1999. [KAR98MA] A. Karmouch, “Guest editorial mobile software agents for telecommunications”, IEEE Communications Magazine, July 1998. [KAR00MA] N. M. Karnik and A. R. Tripathi, “A security architecture for mobile agents in Ajanta”, in 20th International Conference on Distributed Computing Systems, pp.402-409, 2000. [KERBEROS] J. Kohl and B. C. Neuman, The Kerberos network authentication service (Version 5), Internet RFC 1510, Sept. 1993. [KUM97MA] G. P. Kumar and P. Venkataram, “Security management architecture for access control to network resources”, in Computers and Digital Techniques, IEE, vol. 1446, pp.362-370, November 1997. [LAN98MA] D. B. Lange and M. Oshima, Programming, Deploying Java Mobile Agent with Aglets, Assison-Wesley, 1998. [LIP89NU] R. P. Lippman, “An introduction to computing with neural nets”, IEEE ASSP Magazine, pp. 4-22, April 1987. [LUP97MA] E. LUPU and M. Sloman, “A policy based role object model”, in EDOC97, October 1997. [JOR99MA] P. J. Marques, L. M. Silva, J. G. Silva, “Security mechanisms for using mobile agents in electronic commerce”, in The 18th IEEE Symposium on Reliable Distributed Systems, pp.378-383, 1999. [MAR99MA] P. J. Marques, L. M. Silva, J. G. Silva, “Security mechanisms for using mobile agents in electronic commerce”, in 18th IEEE Symposium on Reliable Distributed Systems, pp.378-383, 1999. [MEN96MA] A. Menezes, et al., Handbook of Applied Cryptography, CRC Press, 1996. [NEU94] B. C. Neuman, T. Ts''o, “Kerberos: an authentication services for computer networks”, IEEE Communications Magazine, vol.32, no.9, pp.33-38, 1994. [ODYSSEY] http://www.generalmagtic.com [RUM86NU] D. E. Rumelhart, G. E. Hinton,R. J. Williams, “Learning internal representations by error propagation”, Microstructure of Congnition, vol.1: Foundations, 1986. [SCH96] B. Schneier, Applied Cryptography (Second Edition), John Wiley and Sons Inc., 1996. [SHIP_MAI] http://deneb.genie.uottawa.ca [SNO92SE] D. Snow, W. Chang, “Network security”, Telesystems Conference NTC-92, pp.15/13-15/16, 1992. [SOMA] http://www-lia.deis.unibo.it/Software/SOMA [SOH95SE] B. C. Soh, T. S. Dillion, “Setting optimal intrusion-detection thresholds”, Computers & Security, vol.14, pp.621-631, 1995. [STE88] J. G. Steiner, B. C. Neuman, J. I. Schiller, “Kerberos: An authentication service for open network systems (version 4)”, in The Winter USENIX Conference, pp.191-202, Feb. 1988. [TACOMA] http://www.cs.uit.no/DOS/Tacoma/index.html [TAK98MA] T. Taka, T. Mizuno, T. Watanabe, “A model of mobile agent services enhanced for resource restrictions and security”, in 1998 International Conference on Parallel and Distributed Systems, pp.274-281, 1998. [TAK97MA] Akio TAKUBO, Mutsumi ISHIKAWA, Takashi WATANABE, Masakazu SOGA, Tadanori MIZUNO, “User authentication in mobile computing environment”, IEICE TRANS. On Fundamentals of Electronics, Communications and Computer Sciences, vol. E80-A, no.7, pp.1288-1298, 1997. [TRI99MA] A. Tripathi, N. Karnik, M. Vora, T. Ahmed, R. Singh, “Mobile agent programming in Ajanta”, The 19th International Conference on Distributed Computing Systems, pp.190-197, May 1999. [VOL98MA] R. Volker, J. Mehrdad, “Access control and key management for mobile agents”, Computer and Graphics, vol.22, no.4, pp.457-467, 1998. [VOYAGER] http://www.objectspace.com/voyager [WIL98MA] U. G. Wilhelm, S. Staamann, L. Buttyan, “Protecting the itinerary of mobile agents”, in MOS''98, 1998. [WON99MA] David Wong, Noemi Paciorek, Dana Moore, “Java-based mobile agents”, Communication of the ACM, vol.42, pp.92-102, March 1999. [ZHO96] J. Zhou, D. Gollmann, “Observations on non-repudiation”, Asiacrypt''96, pp.133-144, 1996. [HWA00MA] 黃明祥, 歐俠宏, 張簡尚偉, “安全的行動代理程式傳輸協定”, 第五屆電腦與通信技術研討會, pp3C25-3C29, Oct. 2000. [OU00NU] 歐俠宏, 黃明祥, 李麗華, “以類神經網路為基礎之使用者認證系統”, 2000第八屆模糊理論及其應用會議, Dec. 2000. [YEN00MA] 楊琇娟, 蕭如淵, ”行動代理程式應用在虛擬團隊之安全協定” , 2000網際網路與分散式系統研討會, pp.295-302, May 2000.
|