{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,13]],"date-time":"2025-04-13T04:55:43Z","timestamp":1744520143802},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540658955"},{"type":"electronic","value":"9783540488880"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-48888-x_16","type":"book-chapter","created":{"date-parts":[[2007,10,5]],"date-time":"2007-10-05T08:17:59Z","timestamp":1191572279000},"page":"155-167","source":"Crossref","is-referenced-by-count":26,"title":["Mobile Agent Security \u2014 Issues and Directions"],"prefix":"10.1007","author":[{"given":"Kristian","family":"Schelderup","sequence":"first","affiliation":[]},{"given":"Jon","family":"\u00d8lnes","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1999,4,15]]},"reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Abadi, M., Burrows, M., Lampson, B., Plotkin, G.: A Calculus for Access Control in Distributed Systems, ACM Transactions on Programming Languages and Systems, 15(4) (1993)","DOI":"10.1145\/155183.155225"},{"key":"16_CR2","unstructured":"ACTS Agent Cluster: http:\/\/www.fokus.gmd.de\/research\/cc\/ima\/climate\/entry.html"},{"key":"16_CR3","unstructured":"Chess, D., Grosof, B., Harrison, C., Levine, D., Parris, C., Tsudik, G.: Itinerant Agents for Mobile Computing, IBM Research Report RC 20010 (03\/27\/95) (1995)"},{"key":"16_CR4","unstructured":"Farmer, W.M., Guttman, J.D., Swarup, V.: Security for Mobile Agents: Issues and Requirements, Proceedings of the National Information Systems Security Conference (1996)"},{"key":"16_CR5","unstructured":"Fritzinger, J.S., Mueller, M.: Java Security Whitepaper, Sun Microsystems Inc. (1996)"},{"key":"16_CR6","unstructured":"Gray, R.: AgentTCL: A Flexible and Secure Mobile Agent System, Proceedings of 4th Annual USENIX TcL\/Tk Workshop (1996)"},{"key":"16_CR7","unstructured":"IBM Research: Things that Go Bump in the Net, IBM Research Division, T.J. Watson Research Center (1995)"},{"key":"16_CR8","unstructured":"ITU-T X.810-816 ISO\/IEC 10181\/1-7: OSI-Security Frameworks for Open Systems (1996)"},{"key":"16_CR9","unstructured":"Johansen, D., van Renesse, R., Schneider, F.B.: An Introduction to the TACOMA Distributed System, Version 1.0, Technical Report 95-23, Department of Computer Science, University of Troms\u00f8 (1995)"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Kaliski, B.: PKCS#7: Cryptographic Message Syntax Version 1.5, RFC2315 (1998)","DOI":"10.17487\/rfc2315"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Karjoth, G., Lange, D.B., Oshima, M.: A Security Model for Aglets, IEEE Internet Communication (1997)","DOI":"10.1109\/4236.612220"},{"key":"16_CR12","unstructured":"Kristoffersen, T.: A Security Architecture for Open Distributed Processing, Dr.Scient. thesis 14, University of Oslo (1998)"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"McMahon, P.V.: SESAME V2 Public Key and Authorization Extensions to Kerberos, Proceedings of the ISOC Symposium on Network and Distributed Systems Security (1995)","DOI":"10.1109\/NDSS.1995.390640"},{"key":"16_CR14","unstructured":"OMG Joint Submission by Crystaliz Inc, General Magic Inc, GMD FOKUS, IBM, TOG: Mobile Agent System Interoperability Facility (1997)"},{"key":"16_CR15","unstructured":"Pretty Good Privacy (PGP) international homepage: http:\/\/www.ifi.uio.no\/pgp"},{"key":"16_CR16","unstructured":"Schelderup, K.: Security of Mobile Agents (in Norwegian), NR Report 921, Norwegian Computing Centre (NR) (1997)"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Schneider, F.B.: Towards Fault-tolerant and Secure Agentry, Proceedings of the 11th International Workshop on Distributed Algorithms (1997)","DOI":"10.1007\/BFb0030670"},{"key":"16_CR18","unstructured":"Secure Sockets Layer (SSL): http:\/\/www.netscape.com"},{"key":"16_CR19","unstructured":"Steiner, J.G., Neumann, C., Schiller, J.I.: Kerberos: An Authentication System for Open Network Systems, Proceedings of the 1988 Winter USENIX Conference (1988)"},{"key":"16_CR20","doi-asserted-by":"crossref","unstructured":"Tardo, J., Valente, L.: Mobile Agent Security and Telescript, Proceedings of the IEEE Compcon\u2019 96 Conference (1996)","DOI":"10.1109\/CMPCON.1996.501749"},{"key":"16_CR21","unstructured":"Yee, B.S.; A Sanctuary for Mobile Agents, DARPA Workshop on Foundations for Secure Mobile Code (1996)"}],"container-title":["Lecture Notes in Computer Science","Intelligence in Services and Networks Paving the Way for an Open Service Market"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48888-X_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,3]],"date-time":"2019-05-03T15:07:32Z","timestamp":1556896052000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48888-X_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540658955","9783540488880"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/3-540-48888-x_16","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1999]]}}}