{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:56:31Z","timestamp":1725544591524},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540333760"},{"type":"electronic","value":"9783540333777"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11734666_8","type":"book-chapter","created":{"date-parts":[[2006,3,9]],"date-time":"2006-03-09T07:10:32Z","timestamp":1141888232000},"page":"89-103","source":"Crossref","is-referenced-by-count":0,"title":["Higher Dependability and Security for Mobile Applications"],"prefix":"10.1007","author":[{"given":"Hongxia","family":"Jin","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"Steven Fritzinger and Marianne Mueller. Java Security (1996)"},{"key":"8_CR2","unstructured":"Wahbe, R., Lucco, S., Anderson, T.E., Graham, S.: Efficient software-based fault isolation. In: Proceedings of the ACM SIGCOMM 1996 symposium (1996)"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Necula, G.: Proof Carrying Code. In: Proceedings of the Twenty Fourth Annual Symposium on Principles of Programming Languages (1997)","DOI":"10.1145\/263699.263712"},{"key":"8_CR4","volume-title":"Obfuscated C and other mysteries","author":"D. Libes","year":"1993","unstructured":"Libes, D.: Obfuscated C and other mysteries. Wiley, Chichester (1993)"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Sander, T., Tschudin, C.F.: Protecting mobile agents against malicious hosts. Mobile agents and Security, pp. 44\u201360 (1998)","DOI":"10.1007\/3-540-68671-1_4"},{"key":"8_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/3-540-68671-1_8","volume-title":"Mobile Agents and Security","author":"G. Vigna","year":"1998","unstructured":"Vigna, G.: Cryptographic traces for mobile agents. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol.\u00a01419, pp. 137\u2013153. Springer, Heidelberg (1998)"},{"key":"8_CR7","series-title":"Mobile agents and security","first-page":"92","volume-title":"Time limited blackbox security: protecting mobile agents from malicous hosts","author":"F. Hohl","year":"1998","unstructured":"Hohl, F.: Time limited blackbox security: protecting mobile agents from malicous hosts. Mobile agents and security, pp. 92\u2013113. Springer, Heidelberg (1998)"},{"issue":"2","key":"8_CR8","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"SE-13","author":"D. Denning","year":"1987","unstructured":"Denning, D.: An intrusion detection model. IEEE Transactions on Sofwtare engineering, vol. SE\u00a0SE-13(2), 222\u2013232 (1987)","journal-title":"IEEE Transactions on Sofwtare engineering, vol. SE"},{"key":"8_CR9","volume-title":"Handbook of applied cryptograghy","author":"A.J. Menezes","year":"1997","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptograghy. CRC Press, Boca Raton (1997)"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Jin, H., Lotspiech, J.: Proactive software tampering detection. In: Proceeding of ISC (2003)","DOI":"10.1007\/10958513_27"},{"key":"8_CR11","first-page":"423","volume-title":"Digest of the 1990 Fault Tolerant Computing Symposium","author":"G.F. Sullivan","year":"1990","unstructured":"Sullivan, G.F., Masson, G.M.: Using certification trails to achieve software fault tolerance. In: Digest of the 1990 Fault Tolerant Computing Symposium, pp. 423\u2013431. IEEE Computer Society Press, Los Alamitos (1990)"},{"key":"8_CR12","doi-asserted-by":"publisher","first-page":"1491","DOI":"10.1109\/TSE.1985.231893","volume":"11","author":"A. Avizienis","year":"1985","unstructured":"Avizienis, A.: The N-version approach to fault tolerant software. IEEE Trans. on Software Engineering\u00a011, 1491\u20131501 (1985)","journal-title":"IEEE Trans. on Software Engineering"},{"key":"8_CR13","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1109\/TSE.1975.6312842","volume":"1","author":"B. Randell","year":"1975","unstructured":"Randell, B.: System structure for software fault tolerance. IEEE Trans. on Software Engineering\u00a01, 220\u2013232 (1975)","journal-title":"IEEE Trans. on Software Engineering"},{"key":"8_CR14","doi-asserted-by":"publisher","first-page":"518","DOI":"10.1109\/TC.1984.1676475","volume":"C-33","author":"K.-H. Huang","year":"1984","unstructured":"Huang, K.-H., Abraham, J.: Algorithm-based fault tolerance for matrix operations. IEEE Trans. on Computers\u00a0C-33, 518\u2013529 (1984)","journal-title":"IEEE Trans. on Computers"},{"key":"8_CR15","first-page":"86","volume-title":"Proceedings of the 1989 ACM Symposium on Theory of Computing","author":"M. Blum","year":"1989","unstructured":"Blum, M., Kannan, S.: Designing programs that check their work. In: Proceedings of the 1989 ACM Symposium on Theory of Computing, pp. 86\u201397. ACM Press, New York (1989)"},{"key":"8_CR16","volume-title":"The Traveling Salesman Problem","author":"E.L. Lawler","year":"1985","unstructured":"Lawler, E.L., Lenstra, J.K., Rinnooy Kan, A.H.G., Shmoys, D.B.: The Traveling Salesman Problem. John Wiley and Sons Ltd., Chichester (1985)"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Chess, D., Grosof, B., Harrison, C., Levine, D., Paris, C., Tsudik, G.: \u201dItinerant Agents for Mobile Computing\u201d, Technical report, IBM T.J.Watson Research Center (1995)","DOI":"10.1109\/98.468361"}],"container-title":["Lecture Notes in Computer Science","Security in Pervasive Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11734666_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,17]],"date-time":"2019-04-17T03:40:20Z","timestamp":1555472420000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11734666_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540333760","9783540333777"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/11734666_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}