{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:28:42Z","timestamp":1725568122409},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540290674"},{"type":"electronic","value":"9783540334989"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11558958_118","type":"book-chapter","created":{"date-parts":[[2006,2,23]],"date-time":"2006-02-23T15:02:16Z","timestamp":1140706936000},"page":"974-982","source":"Crossref","is-referenced-by-count":0,"title":["A Secure Migration Mechanism of Mobile Agents Under Mobile Agent Environments"],"prefix":"10.1007","author":[{"given":"Dongwon","family":"Jeong","sequence":"first","affiliation":[]},{"given":"Young-Gab","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Young-Shil","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Lee-Sub","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Soo-Hyun","family":"Park","sequence":"additional","affiliation":[]},{"given":"Doo-Kwon","family":"Baik","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"118_CR1","volume-title":"Programming and deploying Java mobile agents with aglets","author":"D.B. Lange","year":"1998","unstructured":"Lange, D.B., Oshima, M.: Programming and deploying Java mobile agents with aglets. Addison-Wesley, Reading (1998)"},{"key":"118_CR2","doi-asserted-by":"crossref","unstructured":"Karnik, M.M., Tripathi, A.R.: Design Issues in Mobile Agent Programming Systems. IEEE Concurrency, 52\u201361 (July 1998)","DOI":"10.1109\/4434.708256"},{"key":"118_CR3","doi-asserted-by":"crossref","unstructured":"Lange, D.B., Oshima, M.: Seven Good Reasons for Mobile Agents. Communications of the ACM\u00a042(3) (March 1999)","DOI":"10.1145\/295685.298136"},{"key":"118_CR4","unstructured":"OGSi, http:\/\/www.osgi.org\/"},{"key":"118_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1007\/3-540-68671-1_10","volume-title":"Mobile Agents and Security","author":"G. Karjoth","year":"1998","unstructured":"Karjoth, G., Lange, D.B., Oshima, M.: A Security Model for Aglets. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol.\u00a01419, pp. 188\u2013205. Springer, Heidelberg (1998)"},{"key":"118_CR6","unstructured":"Voyager, http:\/\/www.recursionsw.com\/products\/voyager"},{"key":"118_CR7","doi-asserted-by":"crossref","unstructured":"Walsho, T., Pariorek, N., Wong, D.: Security and Reliability in Corcordia. In: The 31st Annual Hawaii International Conference on System Sciences, Hawaii (1998)","DOI":"10.1109\/HICSS.1998.649165"},{"key":"118_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/3-540-68671-1_9","volume-title":"Mobile Agents and Security","author":"R.S. Gray","year":"1998","unstructured":"Gray, R.S., et al.: D\u2019Agents: Security in a multiple-language, mobile-agent system. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol.\u00a01419, p. 154. Springer, Heidelberg (1998)"},{"key":"118_CR9","doi-asserted-by":"crossref","unstructured":"Karnik, N., Tripathi, A.: Security in the Ajanta Mobile Agent System. Software- Practice and Experience (January 2001)","DOI":"10.1002\/spe.364"},{"key":"118_CR10","unstructured":"Corradi, A., Montanari, R., Stefanelli, C.: Mobile Agents Integrity in Ecommerce Applications. In: Proceedings of the 19th IEEE ICDCS 1999, Austin, Texas (May 1999), Jones, T.A.: Writing a good paper. IEEE Trans. on General Writing 1(2), pp. 1\u201310 (May 2002)"},{"key":"118_CR11","doi-asserted-by":"crossref","unstructured":"Jansen, W., Karygiannis, T.: Mobile Agent Security, NIST, Special Publication 800-19 (August 1999)","DOI":"10.6028\/NIST.SP.800-19"}],"container-title":["Lecture Notes in Computer Science","Applied Parallel Computing. State of the Art in Scientific Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11558958_118.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:10:35Z","timestamp":1619507435000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11558958_118"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540290674","9783540334989"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/11558958_118","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}