{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:51:48Z","timestamp":1725490308073},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540442226"},{"type":"electronic","value":"9783540457855"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45785-2_17","type":"book-chapter","created":{"date-parts":[[2007,8,27]],"date-time":"2007-08-27T16:10:08Z","timestamp":1188231008000},"page":"220-231","source":"Crossref","is-referenced-by-count":0,"title":["Securing Agent Based Architectures"],"prefix":"10.1007","author":[{"given":"Michael","family":"Maxim","sequence":"first","affiliation":[]},{"given":"Ashish","family":"Venugopal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,9,2]]},"reference":[{"key":"17_CR1","unstructured":"H. Weber, A. Sunbul, and J. Padberg, \u201cEvolutionary Development Of Business Process Centered Architectures Using Component Technologies,\u201d 2000."},{"key":"17_CR2","series-title":"Lect Notes Comput Sci","first-page":"61","volume-title":"Engineering Distributed Objects (EDO 2000)","author":"F. B\u00fcbl","year":"2000","unstructured":"Felix B\u00fcbl, \u201cTowards desiging distributed systems with ConDIL,\u201d in Engineering Distributed Objects (EDO 2000), Wolfgang Emmerich and Stefan Tai Eds., Berlin, November 2000, LNCS Nr. 999, pp. 61\u201379, Springer."},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Michael Wooldridge and Paolo Ciancarini, \u201cAgent-Oriented Software Engineering: The State of the Art,\u201d in AOSE, 2000, pp. 1\u201328.","DOI":"10.1007\/3-540-44564-1_1"},{"key":"17_CR4","unstructured":"Mary hompson, William Johnston, Srilekha Mudumbai, Gary Hoo, Keith Jackson, and Abdelilah Essiari, \u201cCertificate-based Access Control for Widely Distributed Resources,\u201d pp. 215\u2013228."},{"key":"17_CR5","unstructured":"Kevin Fu, Emil Sit, Kendra Smith, and Nick Feamster, \u201cDos and Don\u2019ts of Client Authentication on the Web,\u201d in Proceedings of the 10th USENIX Security Symposium, Aug. 2001."},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"George C. Necula, \u201cProof-carrying code,\u201d in Conference Record of POPL\u2019 97: The 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, Paris, France, jan 1997, pp. 106\u2013119.","DOI":"10.1145\/263699.263712"},{"key":"17_CR7","unstructured":"J. Feigenbaum and P. Lee, \u201cTrust management and proof-carrying code in secure mobile-code applications,\u201d 1997."},{"key":"17_CR8","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R. S. Sandhu","year":"1996","unstructured":"Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, and Charles E. Youman, \u201cRole-Based Access Control Models,\u201d IEEE Computer, vol. 29, no. 2, pp. 38\u201347, 1996.","journal-title":"IEEE Computer"},{"key":"17_CR9","unstructured":"Communications Of The ACM, \u201c[41] R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems.,\u201d."},{"key":"17_CR10","unstructured":"N. Modadugu, D. Boneh, and M. Kim, \u201cGenerating RSA keys on a handheld using an untrusted server,\u201d 2000."},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Uriel Feige and Joe Kilian, \u201cZero Knowledge and the Chromatic Number,\u201d in IEEE Conference on Computational Complexity, 1996, pp. 278\u2013287.","DOI":"10.1109\/CCC.1996.507690"},{"key":"17_CR12","unstructured":"P. Kaski, \u201cSpecial Course on Cryptology \/ Zero Knowledge: Rudiments of Interactive Proof Systems,\u201d 2001."},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Martin Abadi, Michael Burrows, C. Kaufman, and Butler W. Lampson, \u201cAuthentication and Delegation with Smart-cards,\u201d in Theoretical Aspects of Computer Software, 1991, pp. 326\u2013345.","DOI":"10.1007\/3-540-54415-1_53"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Joan Feigenbaum, Michael J. Freedman, Tomas Sander, and Adam Shostack, \u201cPrivacy Engineering for Digital Rights Management Systems,\u201d in Proceedings of the ACM Workshop in Security and Privacy in Digital Rights Management, November 2001.","DOI":"10.1007\/3-540-47870-1_6"},{"key":"17_CR15","unstructured":"Safuat Hamdy and Markus Maurer, \u201cFeige-Fiat-Shamir Identification Based On Real Quadratic Fields,\u201d."},{"key":"17_CR16","unstructured":"I. Biehl, J. Buchmann, S. Hamdy, and A. Meyer, \u201cA signature scheme based on the intractability of computing roots,\u201d 2000."},{"key":"17_CR17","unstructured":"M. J. Jacobson, Jr., R. Scheidler, and H. C. Williams, \u201cThe Efficiency and Security of a Real Quadratic Field Based-Key Exchange Protocol,\u201d."},{"key":"17_CR18","unstructured":"Aura, \u201cStrategies Against Replay Attacks,\u201d in PCSFW: Proceedings of The 10th Computer Security Foundations Workshop. 1997, IEEE Computer Society Press."},{"key":"17_CR19","doi-asserted-by":"crossref","unstructured":"Victor Boyko and Philip D. MacKenzie and Sarvar Patel, \u201cProvably Secure Password-Authenticated Key Exchange Using Diffie-Hellman,\u201d in Theory and Application of Cryptographic Techniques, 2000, pp. 156\u2013171.","DOI":"10.1007\/3-540-45539-6_12"}],"container-title":["Lecture Notes in Computer Science","Engineering and Deployment of Cooperative Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45785-2_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T16:38:07Z","timestamp":1556815087000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45785-2_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540442226","9783540457855"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/3-540-45785-2_17","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}