Chess D M. Security issues in mobile code systems. In G Vigna, editor, Mobile Agents and Security, volume 1419 of Lecture Notes in Computer Science, New York, NY: Springer-Verlag,1998, 1-14.[2]Karnik N M, Tripathi A R. Design 3s in mobile agent programming systems[J].IEEE Concurrency Magazine.1998, 6(3):52-61[3]Wang X F, Yi X, Lam K Y, Okamoto E. 1998, Secure information gathering agent for internet trading. Proc. of the 4th Australian Workshop on Distributed Artificial Intelligence in joint with the 8th Australian Joint Conference on Artificial Intelligence (DAI 1998), Australia, Lecture Notes in Artificial Intelligence, Springer-Verlag, Vo1.1544: 183-193.[4]陶先平,呂建,張冠群,李新,董桓.一種移動(dòng)Agent結(jié)構(gòu)化遷移機(jī)制的設(shè)計(jì)和實(shí)現(xiàn).軟件學(xué)報(bào),2000,11(7):918-923.[5]Eckel B. Thinking in Java, 2nd Edition, Upper Saddle River, New Jersey: Prentice-Hall, 2000:973-980.[6]Schaaf M, Maurer F. Integrating Java and CORBA: A programmers perspective[J].IEEE Internet Computing Magazine.2001, 5(1):72-78[7]Wilhelm U G, Staamann S M, Buttyan L. A pessimistic approach to trust in mobile agent platforms[J].IEEE Internet Computing Magazine.2000, 4(5):40-48[8]Farmer W, Guttmann J, Swarup V. (1996). Security for mobile agents: Authentication and state appraisal. In Proc. of the European Symposium on Research in Computer Security (ESORICS),LNCS, No.1146, Berlin: Springer-Verlag, 1996: 118-130.[9]王汝傳,徐小龍.移動(dòng)代理安全機(jī)制的研究.計(jì)算機(jī)學(xué)報(bào),2002,25(12):1294-1301.[10]王汝傳,趙新寧.基于網(wǎng)絡(luò)的移動(dòng)代理系統(tǒng)安全模型研究和分析.計(jì)算機(jī)學(xué)報(bào),2003,26(4):477-483.[11]Schneier B. Applied Cryptography: Protocols.[J].Algorithms, and Source Code in C. New York:John Wiley Sons.1996,:-
|