{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:11:57Z","timestamp":1725466317760},"publisher-location":"New York","reference-count":11,"publisher":"Springer-Verlag","isbn-type":[{"type":"print","value":"0387240500"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/0-387-24098-5_1","type":"book-chapter","created":{"date-parts":[[2005,10,3]],"date-time":"2005-10-03T13:34:04Z","timestamp":1128346444000},"page":"1-12","source":"Crossref","is-referenced-by-count":1,"title":["Security Issues in the Tuple-Space Coordination Model"],"prefix":"10.1007","author":[{"given":"Mario","family":"Bravetti","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nadia","family":"Busi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Roberto","family":"Gorrieri","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Roberto","family":"Lucchi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Gianluigi","family":"Zavattaro","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"Bravetti, M., Gorrieri, R., and Lucchi, R. (2003). A formal approach for checking security properties in SecSpaces. In 1st International Workshop on on Security Issues in Coordination Models, Languages and Systems, volume 85.3 of ENTCS."},{"key":"1_CR2","unstructured":"Busi, N., Gorrieri, R., Lucchi, R., and Zavattaro, G. (2002). Secspaces: a data-driven coordination model for environments open to untrusted entities. In 1st International Workshop on Foundations of Coordination Languages and Software Architectures, volume 68.3 of ENTCS."},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Busi, N., Manfredini, C., Montresor, A., and Zavattaro, G. (2003). PeerSpaces: Data-driven Coordination in Peer-to-Peer Networks. In Proc. of ACM Symposium on Applied Computing (SAC'03), pages 380\u2013386. ACM Press.","DOI":"10.1145\/952532.952608"},{"key":"1_CR4","unstructured":"Computing Associates, S. (1995). Linda: User's guide and reference manual. Scientific Computing Associates."},{"issue":"5","key":"1_CR5","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1109\/32.685256","volume":"24","author":"R. Nicola De","year":"1998","unstructured":"De Nicola, R., Ferrari, G., and Pugliese, R. (1998). KLAIM: A Kernel Language for Agents Interaction and Mobility. IEEE Transactions on Software Engineering, 24(5):315\u2013330. Special Issue: Mobility and Network Aware Computing.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"1_CR6","unstructured":"Gigaspaces. Use cases. http:\/\/www.gigaspaces.com\/usecases.htm\/."},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Radu Handorean and Gruia-Catalin Roman (2003). Secure Sharing of Tuple Spaces in Ad Hoc Settings. In 1st International Workshop on on Security Issues in Coordination Models, Languages and Systems, volume 85.3 of ENTCS.","DOI":"10.1016\/S1571-0661(04)80688-1"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Lucchi, R. and Zavattaro, G. (2004). WSSecSpaces: a Secure Data-Driven Coordination Service for Web Services Applications. In Proc. of ACM Symposium on Applied Computing (SAC'04), pages 487\u2013491. ACM Press.","DOI":"10.1145\/967900.968001"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Murphy, A., Picco, G., and Roman, G.-C. (2001). A middleware for physical and logical mobility. In 21st International Conference on Distributed Computing Systems, pages 524\u2013533.","DOI":"10.1109\/ICDSC.2001.918983"},{"key":"1_CR10","unstructured":"Schneier, B. (1996). Applied Cryptography. Wiley."},{"key":"1_CR11","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/S0167-6423(02)00090-4","volume":"46","author":"J. Vitek","year":"2003","unstructured":"Vitek, J., Bryce, C., and Oriol, M. (2003). Coordinating Processes with Secure Spaces. Science of Computer Programming, 46:163\u2013193.","journal-title":"Science of Computer Programming"}],"container-title":["IFIP International Federation for Information Processing","Formal Aspects in Security and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-24098-5_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T00:50:29Z","timestamp":1619484629000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-24098-5_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["0387240500"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/0-387-24098-5_1","relation":{},"subject":[]}}