Filters








2 Hits in 2.2 sec

A Security Framework for a Mobile Agent System [chapter]

Ciarán Bryce
2000 Lecture Notes in Computer Science  
This paper describes a distributed security infrastructure for mobile agents.  ...  The first property of the infrastructure is believability; this means that mechanisms are provided for authenticating information furnished by an agent. A second security property is survivability.  ...  Other work worth mentioning include BirliX [14] and L3 [17] from the operating systems field. These systems encode security policies within programs.  ... 
doi:10.1007/10722599_17 fatcat:4bsv4pvqfzfmxe253g637h3omy

System Security (Dagstuhl Seminar 9214)

Thomas Beth, Whithfield Diffie, Gustavus J. Simmons
1992
Key distribution protocols are presented that allow two parties Alice and Bob to generate a common secret key S about which an enemy Eve cannot obtain more than a non-negligible amount of information (  ...  hypothesis about the computational difficulty of a certain problem, the new approach suffers from none of these disadvantages.  ...  Acknowledgement: We would like to thank everybody who made this workshop possible, interesting and enjoyable, the IBFI Scientific Board of Directors, the participants and everybody who supported us in  ... 
doi:10.4230/dagsemrep.37 fatcat:i5oaoqqlr5bqxk5sr5jpktnsci