{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:35:15Z","timestamp":1725550515399},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540290469"},{"type":"electronic","value":"9783540317319"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11559221_11","type":"book-chapter","created":{"date-parts":[[2005,10,1]],"date-time":"2005-10-01T06:36:05Z","timestamp":1128148565000},"page":"102-111","source":"Crossref","is-referenced-by-count":11,"title":["SECMAP: A Secure Mobile Agent Platform"],"prefix":"10.1007","author":[{"given":"Suat","family":"Ugurlu","sequence":"first","affiliation":[]},{"given":"Nadia","family":"Erdogan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","volume-title":"Proc. Third International Workshop on Agent Theories, Architecures,and Languages","author":"S. Franklin","year":"1996","unstructured":"Franklin, S., Graesser, A.: Is it an Agent, or just a program? A taxonomy for Autonous Agents. In: Proc. Third International Workshop on Agent Theories, Architecures, and Languages. Springer, Heidelberg (1996)"},{"issue":"3","key":"11_CR2","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/4434.708256","volume":"6","author":"N.M. Karnik","year":"1998","unstructured":"Karnik, N.M., Tripathi, A.R.: Design issues in mobile-agent programming systems. IEEE Concurrency\u00a06(3), 52\u201361 (1998)","journal-title":"IEEE Concurrency"},{"key":"11_CR3","unstructured":"Hauswirth, M., Kerer, C., Kurmanowytsch, R.: A flexible and extensible security framework for Java code, Technical Report TUV-1841-99-14, Technical Univ. of Vienna"},{"key":"11_CR4","series-title":"International Computer Science Series","first-page":"477","volume-title":"Distributed systems - concepts and design","author":"G. Coulouris","year":"1994","unstructured":"Coulouris, G., Dollimore, J., Kindberg, T.: Security. In: Distributed systems - concepts and design, 2nd edn. International Computer Science Series, pp. 477\u2013516. Addison-Wesley, Reading (1994)","edition":"2"},{"key":"11_CR5","unstructured":"Hohl, F.: Protecting mobile agents with blackbox security. In: Proc. 1997 Wksp. Mobile Agents and Security, Univ. of Maryland (October 1997)"},{"key":"11_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/3-540-68671-1_5","volume-title":"Mobile Agents and Security","author":"G.C. Necula","year":"1998","unstructured":"Necula, G.C., Lee, P.: Safe, untrusted agents using proofcarrying Code. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol.\u00a01419, pp. 61\u201391. Springer, Heidelberg (1998)"},{"key":"11_CR7","first-page":"267","volume-title":"Readings in Agents","author":"D. Chess","year":"1997","unstructured":"Chess, D., Grosof, B., Harrison, C., Levine, D., Parris, C., Tsudik, G.: Itinerant agents for mobile computing. In: Huhns, M.N., Singh, M.P. (eds.) Readings in Agents, pp. 267\u2013282. Morgan Kaufmann, San Francisco (1997)"},{"key":"11_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1007\/3-540-61770-1_31","volume-title":"Computer Security - ESORICS 96","author":"W. Farmer","year":"1996","unstructured":"Farmer, W., Guttmann, J., Swarup, V.: Security for mobile agents: Authentication and state appraisal. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol.\u00a01146, pp. 118\u2013130. Springer, Heidelberg (1996)"},{"key":"11_CR9","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1023\/A:1012715226170","volume":"4","author":"C. Bryce","year":"2001","unstructured":"Bryce, C., Vitek, J.: The JavaSeal Mobile Agent Kernel. Autonomous Agents and Multi- Agent Systems\u00a04, 359\u2013384 (2001)","journal-title":"Autonomous Agents and Multi- Agent Systems"},{"key":"11_CR10","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1023\/A:1022360516731","volume":"6","author":"V. Varadharan","year":"2003","unstructured":"Varadharan, V., Foster, D.: A Security Architecture for Mobile Agent Based Applications. World Wide Web:Internet and Web Information System\u00a06, 93\u2013122 (2003)","journal-title":"World Wide Web:Internet and Web Information System"}],"container-title":["Lecture Notes in Computer Science","Multi-Agent Systems and Applications IV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11559221_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:11:27Z","timestamp":1619507487000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11559221_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540290469","9783540317319"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/11559221_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}