Chess D M. Security issues in mobile code systems. In G Vigna, editor, Mobile Agents and Security, volume 1419 of Lecture Notes in Computer Science, New York, NY: Springer-Verlag,1998, 1-14.[2]Karnik N M, Tripathi A R. Design 3s in mobile agent programming systems[J].IEEE Concurrency Magazine.1998, 6(3):52-61[3]Wang X F, Yi X, Lam K Y, Okamoto E. 1998, Secure information gathering agent for internet trading. Proc. of the 4th Australian Workshop on Distributed Artificial Intelligence in joint with the 8th Australian Joint Conference on Artificial Intelligence (DAI 1998), Australia, Lecture Notes in Artificial Intelligence, Springer-Verlag, Vo1.1544: 183-193.[4]陶先平,吕建,张冠群,李新,董桓.一种移动Agent结构化迁移机制的设计和实现.软件学报,2000,11(7):918-923.[5]Eckel B. Thinking in Java, 2nd Edition, Upper Saddle River, New Jersey: Prentice-Hall, 2000:973-980.[6]Schaaf M, Maurer F. Integrating Java and CORBA: A programmers perspective[J].IEEE Internet Computing Magazine.2001, 5(1):72-78[7]Wilhelm U G, Staamann S M, Buttyan L. A pessimistic approach to trust in mobile agent platforms[J].IEEE Internet Computing Magazine.2000, 4(5):40-48[8]Farmer W, Guttmann J, Swarup V. (1996). Security for mobile agents: Authentication and state appraisal. In Proc. of the European Symposium on Research in Computer Security (ESORICS),LNCS, No.1146, Berlin: Springer-Verlag, 1996: 118-130.[9]王汝传,徐小龙.移动代理安全机制的研究.计算机学报,2002,25(12):1294-1301.[10]王汝传,赵新宁.基于网络的移动代理系统安全模型研究和分析.计算机学报,2003,26(4):477-483.[11]Schneier B. Applied Cryptography: Protocols.[J].Algorithms, and Source Code in C. New York:John Wiley Sons.1996,:-
|