建筑师 发表于 2025-3-27 01:00:59
http://reply.papertrans.cn/24/2306/230514/230514_31.pnggiggle 发表于 2025-3-27 01:51:05
http://reply.papertrans.cn/24/2306/230514/230514_32.png苍白 发表于 2025-3-27 08:48:14
An Overview of Security Issues and Techniques in Mobile Agents a human user or an application. In the last several years, mobile agents have found numerous applications including e-commerce. In most applications, the security of mobile agents is of the utmost importance. This paper gives an overview of the main security issues related to the mobile agent paradmotivate 发表于 2025-3-27 09:50:13
http://reply.papertrans.cn/24/2306/230514/230514_34.png转折点 发表于 2025-3-27 16:10:32
Mobile Trust Negotiationhorization to mobile devices. We examine how the location of trust agents and secure repositories affects such a system. We also present an implementation of one of these models. This protocol leverages software proxies, autonomous trust agents, and secure repositories to allow portable devices from安定 发表于 2025-3-27 21:45:13
Weak Context Establishment Procedure for Mobility and Multi-Homing Managemente security infrastructure (e.g. a Public-Key Infrastructure). However, building such a global infrastructure has not taken place, maybe because it would be too expensive and difficult to deploy. In this paper, we introduce a security context establishment procedure that utilizes reverse hash chains,暗讽 发表于 2025-3-28 00:45:35
A Generic Architecture for Web Applications to Support Threat Analysis of Infrastructural Componentsdocument describes a generic architecture for typical 3-tier web applications. It serves as the basis for analyzing the threats in the most important infrastructural components in that architecture, presented in the following papers.留恋 发表于 2025-3-28 03:08:48
http://reply.papertrans.cn/24/2306/230514/230514_38.pngMalcontent 发表于 2025-3-28 09:15:24
http://reply.papertrans.cn/24/2306/230514/230514_39.pngANA 发表于 2025-3-28 10:50:16
http://reply.papertrans.cn/24/2306/230514/230514_40.png