{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,23]],"date-time":"2025-01-23T01:40:24Z","timestamp":1737596424658,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":3,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540668565"},{"type":"electronic","value":"9783540466741"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-46674-6_31","type":"book-chapter","created":{"date-parts":[[2007,11,29]],"date-time":"2007-11-29T15:50:17Z","timestamp":1196351417000},"page":"371-372","source":"Crossref","is-referenced-by-count":2,"title":["Security Modeling and Evaluation for the Mobile Code Paradigm"],"prefix":"10.1007","author":[{"given":"Anthony H. W.","family":"Chan","sequence":"first","affiliation":[]},{"given":"Michael R.","family":"Lyu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1999,11,19]]},"reference":[{"key":"31_CR1","doi-asserted-by":"crossref","unstructured":"Fritz Hohl. \u201cA Model of Attacks of Malicious Hosts Against Mobile Agents\u201d. In Fourth Workshop on Mobile Object Systems (MOS\u201998): Secure Internet Mobile Computation, 1998.","DOI":"10.1007\/3-540-49255-0_77"},{"key":"31_CR2","doi-asserted-by":"crossref","unstructured":"Sarah Brocklehurst, Bev Littlewood, Tomas Olovsson and Erland Jonsson. \u201cOn Measurement of Operational Security\u201d. In Proceedings of the Ninth Conference on Computer Assurance (COMPASS\u201994): Safety, Reliability, Fault Tolerance and Real Time, Security, p.257\u2013266.","DOI":"10.1109\/CMPASS.1994.318447"},{"key":"31_CR3","doi-asserted-by":"crossref","unstructured":"Erland Jonsson. \u201cA Quantitative Model of the Security Intrusion Process Based on Attacker Behavior\u201d. In IEEE Transactions on Software Engineering, Vol. 23, No.4. IEEE, April 1997.","DOI":"10.1109\/32.588541"}],"container-title":["Lecture Notes in Computer Science","Advances in Computing Science \u2014 ASIAN\u201999"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46674-6_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,23]],"date-time":"2025-01-23T00:59:04Z","timestamp":1737593944000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46674-6_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540668565","9783540466741"],"references-count":3,"URL":"https:\/\/doi.org\/10.1007\/3-540-46674-6_31","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1999]]}}}