3Ghada Derbas. "TRUMMAR-A Trust Model for Mobile Agent Systems Based on Reputation,"[EB/OL],http://webfea.fea.aub.edu. lb/proceedings/2004/SRC-ECE-44.pdf, April, 2004.
4[1]Harrison C G, Chess D M. Mobile Agent: Are They Good Idea?IBM Research Report,1995
5[2]David K, Robert S G. Mobile Agents and the Future of the Internet. ACM Operating System Review, 1999-08:7-13
6[3]Sander T, Christian F T. Mobile Agent and Security. Spriner Verlag Lecture Notes in Computer Science #1419, 1998-06
7[4]Tripathi A R, Karnik N M. Protected Resource Access for Mobile Agent-based Distributed Computing. Proceedings of the 1998 ICPP Workshop on Wireless Networks and Mobile Computing.IEEE Computer Society, 1998-08: 144-153
8[5]Greenberg M S, Byington L C, Harper D G. Mobile Agents and Security. IEEE Communications Magazine, 1998, 36(7): 76-85