2Chess D. Security Issues in mobile code systems. In: Vigna G ed. Mobile Agent Security, 1998. 1-14
3Karnik N M, Tripathi A R. Design issues in mobile agent programming systems. IEEE Concurrency, 1998, 6(3) :52-61
4Wilhelm U G, Saamann S M, Buttyan L. A pessimistic approach to trust in mobile agent platforms. IEEE Ccmputing, 2000,10(4) :40-48
5Martin Schaaf, Frank Maure. Integrating Java and CORBA: A programmer' s perspective. IEEE Internet Computing, 2001,7 (1) :72-78
6Wang X F, Yi X, Lam K Y. Secure information agent for inter net trading. In: Proc the 11th Australian Joint Conference on Artificial Intelligence'98, Brisban, Australia, 1998. 183-194
7Farmer W M, Gutman J D, Swarup V. Security for mobile a gents: Authentication and state appraisal. In: Proc the 4th European Symposium on Research in Computer Security, Rome, Italy, 1996. 18-130
8Bruce Eckel. Thinking in Java, 2nd Edition. New Jersey: Pren tice-Hall, 2000
9Pfleeger C P. Security in Computing. 2nd Edition. Upper Sad dle River, New Jersey: Prentice Hall, 1997
10Davies W, Price W L. Security for Computer Networks. Chich esfer: John Wiley & Sons, 1989