R.B. Patel and K. Garg
[1] S.N. Hyacinth, Software agents: An overview, KnowledgeEngineering Review, 11 (3), 1996, 1–40. [2] W.M. Farmer, J.D. Guttman, & V. Swarup, Security formobile agents: Issues and requirements, Proc. 19 th NationalInformation Systems Security Conf., Baltimore, MD, October22-25, 1996, 591–597. [3] G. Karjoth, D. Lange, & M. Oshima, A security model forAglets, IEEE Internet Computing, 1997, 68–77. doi:10.1109/4236.612220 [4] G. Vigna (ed.), Mobile agents and security, LNCS 1419,Springer, Berlin, Heidelberg, 1998. [5] T. Tamai, Objects and roles: Modeling based on the dualisticview, Information and Software Technology, 41(14), 1999,1005–1010. doi:10.1016/S0950-5849(99)00075-0 [6] G. Glass, Objectspace voyager core package technical overview,D. Milojicic, F. Douglis, & R. Wheeler (Ed.), Mobility: Pro-cesses, computers and agents (USA: Addison Wesley, 1999). [7] D. Milojicic, F. Douglis, & R. Wheeler (eds), Mobility: Pro-cesses, computers and agents (USA: Addison Wesley, 2000). [8] N. Karnik, Security in mobile agent systems, doctoral diss.,Department of Computer Science and Engineering, Universityof Minnesota, 1998. [9] R.B. Patel & K. Garg, Providing security and robustness tomobile agents on open networks, Proc. 6 th Int. Conf. on182Business Information Systems (BIS 2003), Spring, CO, June4-6, 2003, 66–74. [10] D. Westhoff, M. Schneider, C. Unger, & F. Kaderali, Protectinga mobile agent’s route against collusions, LNCS 1758, Springer-Verlag, 2000, 215–225. [11] T. Li, C.K. Seng, & K.Y. Lam, A secure route structure forinformation gathering, Proc. 2000 Pacific Rim Int. Conf. onAI, Melbourne, Australia, 2000, 101–114. [12] J. Mir & J. Borrell, Protecting general flexible itineraries ofmobile agents, Information Security & Cryptography, LNCS2288, Springer-Verlag, 2002, 382–396. [13] Y. Wang & T. Kian-Lee, Dispatching mobile agents with secureroutes in parallel, Proc. of 3rd International Conference onInformation & Communication Security (ICICS 2001), LNCS2229, Xian, China, Nov 13-16, 2001, 386–397. [14] W. Jansen & T. Karygiannis, NIST special publication 800-19:Mobile agent security, NIST, Gaithersburg, MD, 2000. [15] R.B. Patel & K. Garg, PMADE: A platform for mobileagent distribution & execution, Proc. 5 th World MultiConf.on Systemics, Cybernetics and Informatics (SCI2001),Vol. 4,Orlando, FL, 2001, 287–293. [16] R.B. Patel & K. Garg, A security framework for mobile agentsystems, Proc. 6 th Int. Conf. on Business Information Systems(BIS 2003), Spring, CO, June 4-6, 2003, 49–56. [17] R. Helton & J. Helton, Mastering Java security: Cryptographyalgorithms and architecture, 1st ed. (India: Wiley, 2002). [18] L. Gong, Secure Java classloading, IEEE Internet Computing,2 (6), 1998, 56–61. doi:10.1109/4236.735987 [19] D. Chess, B. Grosof, C. Harrison, D. Levine, C. Parris, & G.Tsudik, Itinerant agents or mobile computing, IEEE PersonalCommunications Magazine, 2, 1995, 34–49. doi:10.1109/98.468361 [20] G. Karjoth, N. Asokan, & U.C. G.ulc, Protecting the com-putation of free roaming agents, Mobile Agents, LNCS 1477,Springer-Verlag, 1998, 194–207. [21] IKV++GmbH Informations und Kommunikationssyteme,Grasshopper Development Systems, Release 1.2, Basics andConcepts, IKV++ GmbH Informations und Kommunikation-ssyteme, February 1999. [22] P. Bellavista, A. Corradi, & C. Stefanelli, Protection and in-teroperability for mobile agents: A secure and open program-ming environment, IEICE Trans. on Communication, SpecialIssue on Autonomous Decentralized Systems, E-83-B(5), 2000,961–972.
Important Links:
Go Back