1N M Kamik,A R Tripathi.Design Issues in Mobile Agent Programming Systems[J].IEEE Concurrency, 1998 ; 6 (3) : 52-61.
2T Sander,C F Tschudin.Protecting Mobile Agents Against Malicious Hosts[C].In:G Vigna ed.Mobile Agents and Securlty,Berlin Heidelberg: Springer-Verlag, 1998:44-60.
3A Corradi,M Cremonini,C Stefanelli.Locality Abstractions and Security Models in a Mobile Agent Environment[C].In:Proc Seventh IEEE International Workshops on Enabling Technologies:Infrastructure for Collaborative Enterofises,Los Alamitos,CA,1998-06:230-235.
4W R Cockayne,M Zyda.Mobile Agents[M].Greenwich,CT:Manning Publications Co., 1998.
5N Minar,K H Kramer,P Maes.Cooperating Mobile Agents for Mapping Networks[C].In:Proc First Hungarian National Conference on Agent Based Computing,Budapest,Hungary,1998-05:12.
6D Chess,B Grosof,C Harrison et al.hinerant Agents for Mobile Computin[R].IBM Research Report RC 20010,IBM,1995-03-27.
7D Kotz,R S Gray.Mobile Agents and the Future of the lnternet[J]. ACM Operating Systems Review,1999;33(3) :7-13.