Descriptor
| Computer Security | 2 |
| Internet | 2 |
| Models | 2 |
| Programming | 2 |
| Programming Languages | 2 |
| World Wide Web | 2 |
| Business | 1 |
| Computation | 1 |
| Computer Mediated… | 1 |
| Computer Software | 1 |
| Computer Software Development | 1 |
| More ▼ | |
Source
| Internet Research | 4 |
Author
| Aggelis, George | 1 |
| Brennan, Brian | 1 |
| Brennan, Chris | 1 |
| Corradi, Antonio | 1 |
| Finkel, David | 1 |
| Gritzalis, Stefanos | 1 |
| Montanari, Rebecca | 1 |
| Omicini, Andrea | 1 |
| Spinellis, Diomidis | 1 |
| Stefanelli, Cesare | 1 |
| Wills, Craig E. | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 4 |
| Reports - Descriptive | 4 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Peer reviewedCorradi, Antonio; Montanari, Rebecca; Stefanelli, Cesare – Internet Research, 2001
Discussion of the Internet focuses on new programming paradigms based on mobile agents. Considers the security issues associated with mobile agents and proposes a security architecture composed of a wide set of services and components capable of adapting to a variety of applications, particularly electronic commerce. (Author/LRW)
Descriptors: Computer Security, Internet, Programming
Peer reviewedFinkel, David; Wills, Craig E.; Brennan, Brian; Brennan, Chris – Internet Research, 1999
Describes a system for using the World Wide Web to distribute computational tasks to multiple hosts on the Web that is written in Java programming language. Describes the programs written to carry out the load distribution, the structure of a "distriblet" class, and experiences in using this system. (Author/LRW)
Descriptors: Computation, Computer Software, Computer System Design, Programming Languages
Peer reviewedGritzalis, Stefanos; Aggelis, George; Spinellis, Diomidis – Internet Research, 1999
Discusses downloadable executable content, or mobile code, on the World Wide Web; evaluates the security features offered by the Java and Safe-Tcl programming languages; and describes the basic mechanisms of each of the proposed security models. Presents current implementations, as well as upcoming extensions, and evaluates their efficiency and…
Descriptors: Computer Security, Evaluation Methods, Futures (of Society), Models
Peer reviewedOmicini, Andrea; Zambonelli, Franco – Internet Research, 1998
Examines mobile agent coordination and presents TuCSoN, a coordination model for Internet applications based on mobile information agents that uses a tuple centre, a tuple space enhanced with the capability of programming its behavior in response to communication events. Discusses the effectiveness of the TuCSoN model in the contexts of Internet…
Descriptors: Business, Computer Mediated Communication, Computer Software Development, Database Design


