Descriptor
Computer Security | 2 |
Internet | 2 |
Models | 2 |
Programming | 2 |
Business | 1 |
Computer Mediated… | 1 |
Computer Software Development | 1 |
Database Design | 1 |
Evaluation Methods | 1 |
Futures (of Society) | 1 |
Information Retrieval | 1 |
More ▼ |
Source
Internet Research | 3 |
Author
Aggelis, George | 1 |
Corradi, Antonio | 1 |
Gritzalis, Stefanos | 1 |
Montanari, Rebecca | 1 |
Omicini, Andrea | 1 |
Spinellis, Diomidis | 1 |
Stefanelli, Cesare | 1 |
Zambonelli, Franco | 1 |
Publication Type
Journal Articles | 3 |
Reports - Descriptive | 3 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Peer reviewed
Corradi, Antonio; Montanari, Rebecca; Stefanelli, Cesare – Internet Research, 2001
Discussion of the Internet focuses on new programming paradigms based on mobile agents. Considers the security issues associated with mobile agents and proposes a security architecture composed of a wide set of services and components capable of adapting to a variety of applications, particularly electronic commerce. (Author/LRW)
Descriptors: Computer Security, Internet, Programming
Peer reviewed
Omicini, Andrea; Zambonelli, Franco – Internet Research, 1998
Examines mobile agent coordination and presents TuCSoN, a coordination model for Internet applications based on mobile information agents that uses a tuple centre, a tuple space enhanced with the capability of programming its behavior in response to communication events. Discusses the effectiveness of the TuCSoN model in the contexts of Internet…
Descriptors: Business, Computer Mediated Communication, Computer Software Development, Database Design
Peer reviewed
Gritzalis, Stefanos; Aggelis, George; Spinellis, Diomidis – Internet Research, 1999
Discusses downloadable executable content, or mobile code, on the World Wide Web; evaluates the security features offered by the Java and Safe-Tcl programming languages; and describes the basic mechanisms of each of the proposed security models. Presents current implementations, as well as upcoming extensions, and evaluates their efficiency and…
Descriptors: Computer Security, Evaluation Methods, Futures (of Society), Models