3Michael Wooldridge,Nicholas R. Jennings,David Kinny. The Gaia Methodology for Agent-Oriented Analysis and Design[J] 2000,Autonomous Agents and Multi - Agent Systems(3):285~312
5W Lugmayr. Mobile code, agents, and Java. 2000. http://www. infosys, tuwien, ac. at/Research/Agents/homepage. html.
6W Jansen, T Karygiannis. NIST special piblications 800-19:Mobile agent security. National Institute of Standards and Technology, Tech Rep: MD208999, 1999.
7W Jansen. Countermeasures for mobile agent security. Computer Communications, 2000, 23(10): 1667--1677.
8R Wahbe, S Lucco, T E Anderson et al. Efficient software-based fault isolation. In: Proc of the 14th ACM Symposium on Operating Systems Principles. New York: ACM Press, 1993.203--216.
9J K Ousterhout. Scripting: Higher-level programming for the 21st century. IEEE Computer, 1998, 31(3) : 23--30.
10G C Necula, P Lee. Safe kernel extensions without run-time checking. In: Proc of the 2nd Symposium on Operating System Design and Implementation. Berkeley: USENIX Association,1996. 229--243.