Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
This paper presents a hardware based protection infrastructure that takes advantage of the recent advances in trusted hardware in order to solve the problem ...
In this paper we argue that the main obstacle for the practical application of multi-agent systems is the lack of appropriate security mechanisms. Moreover, we ...
Protected Computing Approach: Towards the Mutual Protection. 539 systems and are considered to be one of the main issues to solve before agent technology is ...
It is argued that the main obstacle for the practical application of multi-agent systems is the lack of appropriate security mechanisms and it is shown that ...
We introduced the application of the Protected Computing paradigm to agents in [3] . In this paper we further develop this latter approach. ... ... Some of ...
This paper presents a software based solution for the protection of multi-agent systems based on mobility property of agents. This approach focuses on the ...
Abstract. Security is a fundamental precondition for the acceptance of mo- bile agent systems. In this paper we discuss protocols to improve agent secu-.
A method of establishing a protected environment within a computing device including validating a kernel component loaded into a kernel of the computing ...
The assets to be protected should be categorized by value, the vulnerabilities by importance, and the risks by severity, and defensive measures should be ...
Details of a planning study for USAF computer security requirements are presented. An Advanced development and Engineering program to obtain an open-use, ...