Sciweavers

243 search results - page 17 / 49
» Secure mobile agent systems using Java: where are we heading
Sort
View
ISSTA
2009
ACM
15 years 8 months ago
Run-time conformance checking of mobile and distributed systems using executable models
This paper describes an approach for conformance testing of mobile and distributed systems. The approach is based on kiltera — a novel, high-level language supporting the descri...
Ahmad A. Saifan, Ernesto Posse, Jürgen Dingel
MA
1999
Springer
138views Communications» more  MA 1999»
15 years 7 months ago
ADK--Building Mobile Agents for Network and Systems Management from Reusable Components
Mobile agents, programs that move within a system performing a set of tasks, are an active field of research. The focus of current research, however, is on the development of exe...
Thomas Gschwind, Metin Feridun, Stefan Pleisch
137
Voted
SOCO
2008
Springer
15 years 3 months ago
Component-Based Access Control: Secure Software Composition through Static Analysis
Abstract. Extensible Component Platforms support the discovery, installation, starting, uninstallation of components at runtime. Since they are often targeted at mobile resource-co...
Pierre Parrend, Stéphane Frénot
118
Voted
PUC
2008
141views more  PUC 2008»
15 years 2 months ago
A calendar based Internet content pre-caching agent for small computing devices
We described in earlier publications the principles of a system where internet content would be pre-cached, based on contextual information obtained from a user's electronic ...
Andreas Komninos, Mark D. Dunlop
125
Voted
EDOC
2004
IEEE
15 years 7 months ago
Security Patterns: A Method for Constructing Secure and Efficient Inter-Company Coordination Systems
As the Internet, intranets and other wide-area open networks grow, novel techniques for building distributed systems, notably mobile agents, are attracting increasing attention. T...
Nobukazu Yoshioka, Shinichi Honiden, Anthony Finke...