1998
DOI: 10.1007/3-540-68671-1_10
|View full text |Cite
|
Sign up to set email alerts
|

A Security Model for Aglets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
49
0
1

Year Published

1998
1998
2013
2013

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 48 publications
(51 citation statements)
references
References 4 publications
1
49
0
1
Order By: Relevance
“…[10,7]) to profit from both technologies: The client directs her query to a mediator; the mediator constructs an agent to collect the partial results from the datasources. This reduces communication overhead between mediator and datasources.…”
Section: Resultsmentioning
confidence: 99%
“…[10,7]) to profit from both technologies: The client directs her query to a mediator; the mediator constructs an agent to collect the partial results from the datasources. This reduces communication overhead between mediator and datasources.…”
Section: Resultsmentioning
confidence: 99%
“…-The specification of appropriate security policies, whether in the context of our security infrastructure or another, is a critical area for future research. The Aglets project has one preliminary proposal [14].…”
Section: Statusmentioning
confidence: 99%
“…After registering with the agent system, the agent requests access to the needed system resources (lines 6-9). Then the agent waits for a query (lines [14][15]. Once the agent has a query, it verifies that the querying agent is on the same machine (lines [17][18][19][20], that the owner of the agent could be authenticated (lines [22][23][24][25][26], and that the owner is on the collection access list (lines 28-32).…”
Section: Figmentioning
confidence: 99%
See 2 more Smart Citations