Nicklisch et al., “INCA: An Agent-Based Network Control Architecture”, second International Workshop, IATA 98 Proceedings, Jul. 4-7, 1998.* |
Hansoty et al., “JAVA: Secure Delegation of Mobile Applets”, IEEE Workshops, pp. 242-247, Jun. 18-20, 1997.* |
ObjectSpace: Voyager Press Releases, ObjectSpace, Inc. Announces Voyager™, The World's First Platform for Agent-Enhanced Distributed Computing in Java™, http:www.objectspace.com/company/vgrpress. Apr. 2, 1997, pp. 1-4. |
Mitsuru Oshima, Guenter Karoth and Kouichi Ono, Aglets Specification 1.1 Draft, Sep. 8, 1998, http://www.trl.ibm.co.jp/aglets/spec11.html, , pp. 1-43. |
Danny B. Lange. IBM Tokyo Rearch Laboratory, Java Aglet Application Programming Interface (J-AAPI) White Paper—Draft 2. http://www.trl.ibm.com.jp/aglets, Feb. 19, 1997, pp. 1-6. |
IBM Co., Aglets Software Development Kit—About Aglets (visted Jul. 26, 1999), http://www.trl.ibm.co.jp/aglets/about.html, pp. 1-2. |
ObjectSpace, Voyager Core Technology Version 2.0 Now Available (visited Jan. 12, 1999) http:www.objectspace.com/products/voyager/core/index.html, pp. 1-8. |
Susilo G et al: Infrastructure for Advanced Network Management Based on Mobile Code, IEEE Network Operations and Management Symposium, US, New York, NY: IEEE, vol. Conf. 10, Feb. 15, 1998, pp. 322-333. |
Zhang D et al: Developing network management applications in an application-oriented way using mobile agent, Computer Network and ISDN Systems, NL, North Holland Publishing, Amsterdam, vol. 30, No. 16-18,Sep. 30, 1998, pp. 1551-1557. |
Liotta A et al: Modelling Network and System Monitoring Over the Internet with Mobile Agents, IEEE Network Operations and Management Symposium, US, New York, NY: IEEE, vol. Conf. 10, Feb. 15, 1998, pp. 303-312. |
Grimm R et al: Security policies in OSI-management experiences from the DeTeBerkom project BMSec, Computer Networks and ISDN Systems, NL, North Holland Publishing, Amsterdam, vol. 28, No. 4, Feb. 1, 1996. |
Nicklisch et al., “INCA: an agent-based network control architecture”, second international workshop, IATA 98 proceedings, Jul. 4-7, 1998, all pages. |
Hansoty et al., “JAVA: secure delegation on mobile applets”, IEEE workshops, Jun. 18-20, 1997, pp. 242-247. |
Susilo., “Infrastructure for Advanced Network Management Based on Mobile Code”, IEEE Network Operations and Management Symposium, US, New York NY: IEEE vol. Conf. 10, Feb. 15, 1998, pp. 322-333, XP000799502 ISBN: 0-7803-4352-2, whole document. |
Zhang et al., “Developing network management applications in an application-oriented way using mobile agent”, Computer Networks and ISDN Systems, NL, North Holland Publishing, Amsterdam, vol. 30, No. 16-18, Sep. 30, 1998, pp. 1551-1557, XP004138686, ISSN: 0169-7552, whole document. |
Liotta et al., “Modelling Network and System Monitoring Over the Internet with Mobile Agents”, IEEE Network Operations and Management Symposium, US, New York, NY: IEEE, vol. CONF. 10, Feb. 15, 1998, pp. 303-312, XP000799500, ISBN: 0-7803-4352-2, whole document. |
Grimm, et al., “Security policies in OSI-management experiences from the DeTeBerkom project BMSec”, Computer Networks and ISDN Systems, NL, North Holland Publishing, Amsterdam. vol. 28, No. 4, Feb. 1, 1996, psrd 599-622, XP005003983, ISSN: 0169-7552, whole document. |