Descriptor
| Models | 2 |
| Business | 1 |
| Computer Mediated… | 1 |
| Computer Security | 1 |
| Computer Software Development | 1 |
| Database Design | 1 |
| Evaluation Methods | 1 |
| Futures (of Society) | 1 |
| Information Retrieval | 1 |
| Information Technology | 1 |
| Internet | 1 |
| More ▼ | |
Source
| Internet Research | 2 |
Publication Type
| Journal Articles | 2 |
| Reports - Descriptive | 2 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Peer reviewedGritzalis, Stefanos; Aggelis, George; Spinellis, Diomidis – Internet Research, 1999
Discusses downloadable executable content, or mobile code, on the World Wide Web; evaluates the security features offered by the Java and Safe-Tcl programming languages; and describes the basic mechanisms of each of the proposed security models. Presents current implementations, as well as upcoming extensions, and evaluates their efficiency and…
Descriptors: Computer Security, Evaluation Methods, Futures (of Society), Models
Peer reviewedOmicini, Andrea; Zambonelli, Franco – Internet Research, 1998
Examines mobile agent coordination and presents TuCSoN, a coordination model for Internet applications based on mobile information agents that uses a tuple centre, a tuple space enhanced with the capability of programming its behavior in response to communication events. Discusses the effectiveness of the TuCSoN model in the contexts of Internet…
Descriptors: Business, Computer Mediated Communication, Computer Software Development, Database Design


