References
1. W. Jansen, T. Karygiannis: Mobile Agent Security. NIST Special Publication 800-19,
October 1999.
2. L. M. Silva, P. Simoes, G. Soares, P. Martins, V. Batista, C. Renato, L. Almeida, N. Stohr:
JAMES: A Platform for Moble Agents for the Management of Telecommunication
Networks. Proceedings Intelligent Agents for Telecommunication Applications, IATA’99,
Stockholm, Sweden, August 1999.
3. A. Puliafito, O. Tomarchio: Design and Development of a Practical Security Model for
Mobile Agent System. 7
th
IEEE International Symposium on Computers and
Communications, ISCC’02.
4. S. Fischmeister, G. Vigna, R. A. Kemmerer : Evaluating the Security of Three Java-Based
Mobile Agent Systems. 5
th
IEEE International Conference on Mobile Agents (MA’01).
Atlanta, Georgia, USA, December 2001.
5. R. Wahbe, S. Lucco, T. Anderson: Efficient Software-Based Fault Isolation, October 1998.
6. W. Farmer, J. Guttman, V. Swarup: Security for Mobile Agents: Authentication and State
Appraisal. Proceedings of the 4
th
European Symposium on Research in Computer Security
(ESORICS), September 1996.
7. J. J. Ordille: When Agents Roam, Who Can You Trust? Proceedings of the First Conference
on Emerging Technologies and Applications in Communications, May 1996.
8. D. Chess, B. Grosof, C. Harrison, D. Levine, C. Parris, G. Tsudik: Itinerant Agents for
Mobile Computing. IEEE Personal Communications, vol.2, no. 5, October 1995.
9. G. Necula, P. Lee: Safe Kernel Extensions Without Run-Time Checking. Proceedings of the
2
nd
Symposium on Operating System Design and Implementation (OSDI), October 1996.
10. G. Vigna: Protecting Mobile Agents Through Tracing. Proceedings of the 3
rd
ECOOP
Workshop on Mobile Object Systems, June 1997.
11. J. Riordan, B. Schneier: Environmental Key Generation Towards Clueless Agents. Mobile
Agents and Security, Springer-Verlag, Lecture Notes in Computer Science No. 1419, 1998.
12. T. Sander, C. Tschdin: Protecting Mobile Agents Against Malicious Hosts. Mobile Agents
and Security, Springer-Verlag, Lecture Notes in Computer Science No. 1419, 1998.
13. F. Hohl: Time Limited Blackbox Security: Protecting Mobile Agents From Malicious
Hosts. Mobile Agents and Security, Springer-Verlag, Lecture Notes in Computer Science
No. 1419, 1998.
14. D. B. Lange, M. Oshima: Programming and Deploying Java Mobile Agents with Aglets.
Addison-Wesley, 1998. ISBN 0-201-32582-9.
15. J. Altmann, F. Gruber, L. Klug, W. Stockner, E. Weippl: Using Mobile Agents in Real
World: A Survey and Evaluation of Agent Platforms. 5
th
International Conference on
Autonomous Agents, 2
nd
Workshop on Infrastructure for Agents, MAS, and Scalable MAS
at Autonomous Agents. Montreal, Canada, May 2001.
16. W. Wong: Stunnel: SSLing Internet Services Easily. SANS Institute, November 2001.
17. A. Pankratov: Trivial Denial of Service Attack against TCP-based VPN. Security Focus,
April 2003.
18. N. Rinsema: Secure (and free) IP Tunneling using Zebedee. SANS Institute, June 2001.
19. M. Zalewski: Strange Attractors and TCP/IP Sequence Number Analysis. BlindView
Corporation, 2001.
72