共 21 条
[1]
Alfalayleh M., 2004, P 8 IFIP TC 6 TC 11, P59
[2]
Bellifemine F., 1999, INT C EXH PRACT APPL
[3]
Bernard G., 2002, RSTI TSI, V21, P771
[5]
Beydoun G., 2005, INT C SOFTW ENG ICSE, P255
[6]
Beydoun G., 2007, 12 INT WORKSH EXPL M, P179
[7]
Bierman E., 2002, Proceedings Of The 2002 Annual Research Conference of The South African Institute of Computer Scientists and Information Technologists on Enablement Through Technology, SAICSIT, P141
[8]
Mobile agent security
[J].
ELECTRONICS & COMMUNICATION ENGINEERING JOURNAL,
2002, 14 (05)
:211-218
[9]
Ferraiolo D. F., 2001, ACM Transactions on Information and Systems Security, V4, P224, DOI 10.1145/501978.501980