{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T09:48:32Z","timestamp":1747907312950},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540410218"},{"type":"electronic","value":"9783540452669"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/10722620_26","type":"book-chapter","created":{"date-parts":[[2006,12,30]],"date-time":"2006-12-30T14:00:16Z","timestamp":1167487216000},"page":"275-286","source":"Crossref","is-referenced-by-count":6,"title":["Data Lockers: Mobile-Agent Based Middleware for the Security and Availability of Roaming Users Data"],"prefix":"10.1007","author":[{"given":"Yolanda","family":"Villate","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Arantza","family":"Illarramendi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Evaggelia","family":"Pitoura","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"26_CR1","doi-asserted-by":"crossref","unstructured":"D.S. Milojicic, et al.: MASIF, the OMG Mobile Agent System Interoperability Facility. In: Proceedings of Mobile Agents 1998 (September 1998)","DOI":"10.1007\/BFb0057648"},{"key":"26_CR2","doi-asserted-by":"crossref","unstructured":"Amir, Y., Awerbuch, B., Borgstrom, R.S.: A cost-benefit framework for online management of a metacomputing system. In: The International Journal for Decision Support Systems. Elsevier Science, Amsterdam (to appear)","DOI":"10.1145\/288994.289026"},{"key":"26_CR3","unstructured":"Gray, R., Rus, D., Kotz, D.: Agent TCL: Targeting de needs of mobile computers. IEEE Internet Computing (1997)"},{"key":"26_CR4","doi-asserted-by":"crossref","unstructured":"Joseph, A.D., Tauber, J.A., Kaashoek, M.F.: Mobile computing with the Rover toolkit. IEEE Transactions on Computers: Special Issue on Mobile Computing\u00a046(3) (March 1997)","DOI":"10.1109\/12.580429"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Joshi, A., Weerawarana, S., Houstis, E.: On disconnected browsing of distributed information. In: IEEE RIDE 1991, pp. 101\u2013107 (1997)","DOI":"10.1109\/RIDE.1997.583714"},{"key":"26_CR6","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/146941.146942","volume":"10","author":"J.J. Kistler","year":"1992","unstructured":"Kistler, J.J., Satyanarayanan, M.: Disconnected operation in the Coda file system. ACM Transactions on Computer Systems\u00a010, 3\u201325 (1992)","journal-title":"ACM Transactions on Computer Systems"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"Kovacs, E., R\u00f6hrle, K., Reich, M.: Mobile agents OnTheMove - integrating an agent system into the mobile middleware. In: Acts Mobile Summit., Rhodos, Greece (June 1998)","DOI":"10.1007\/BFb0057653"},{"key":"26_CR8","unstructured":"IBM Aglets Workbench Home Page, http:\/\/www.trl.ibm.co.jp\/aglets\/"},{"key":"26_CR9","doi-asserted-by":"crossref","unstructured":"Papastavrou, S., Samaras, G., Pitoura, E.: Mobile agents for WWW distributed database access. In: Proceedings of the International Conference on Data Engineering (1999)","DOI":"10.1109\/ICDE.1999.754928"},{"key":"26_CR10","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-5527-8","volume-title":"Data Management for Mobile Computing","author":"E. Pitoura","year":"1998","unstructured":"Pitoura, E., Samaras, G.: Data Management for Mobile Computing. Kluwer Academic Publishers, Dordrecht (1998)"},{"key":"26_CR11","unstructured":"Samaras, G., Pitsillides, A.: Client\/Intercept: a computational model for wireless environments. In: Proceedings of the 4th International Conference on Telecommunications (ICT 1997) (April 1997)"},{"key":"26_CR12","volume-title":"Applied Cryptography","author":"B. Schneier","year":"1996","unstructured":"Schneier, B.: Applied Cryptography, 2nd edn. John Wiley & Sons, Chichester (1996)","edition":"2"},{"key":"26_CR13","doi-asserted-by":"crossref","unstructured":"Tschudin, C.: Mobile agent security. In: Intelligent Information Agents. Forthcoming LNCS. M. Klusch","DOI":"10.1007\/978-3-642-60018-0_22"},{"key":"26_CR14","unstructured":"Villate, Y., Gil, D., Go\u00f1i, A., Illarramendi, A.: Mobile agents for providing mobile computers with data services. In: Proceedings of the Ninth IFIP\/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 1998 (1998)"},{"key":"26_CR15","doi-asserted-by":"crossref","unstructured":"Villate, Y., Pitoura, E., Illarramendi, A., Elrna-garmid, A.K.: Extending the data services of mobile computers by external data lockers. In: Proceedings of the Third International Workshop on Mobility in Databases and Distributed Systems, MDDS 2000. IEEE Computer Society Press, Los Alamitos (September 2000)","DOI":"10.1109\/DEXA.2000.875020"},{"key":"26_CR16","unstructured":"X: drive, http:\/\/www.xdrive.com\/"}],"container-title":["Lecture Notes in Computer Science","Cooperative Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/10722620_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,23]],"date-time":"2019-04-23T11:58:18Z","timestamp":1556020698000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/10722620_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540410218","9783540452669"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/10722620_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2000]]}}}