{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T10:06:59Z","timestamp":1751623619850,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540647928"},{"type":"electronic","value":"9783540686712"}],"license":[{"start":{"date-parts":[[1998,1,1]],"date-time":"1998-01-01T00:00:00Z","timestamp":883612800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/3-540-68671-1_10","type":"book-chapter","created":{"date-parts":[[2007,8,1]],"date-time":"2007-08-01T02:15:31Z","timestamp":1185934531000},"page":"188-205","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["A Security Model for Aglets"],"prefix":"10.1007","author":[{"given":"G\u00fcnter","family":"Karjoth","sequence":"first","affiliation":[]},{"given":"Danny B.","family":"Lange","sequence":"additional","affiliation":[]},{"given":"Mitsuru","family":"Oshima","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1998,6,18]]},"reference":[{"key":"10_CR1","unstructured":"J.J. Ordille. When agents roam, who can you trust?. Proc. First Conf. on Emerging Technologies and Applications in Communications (etaCOM), \nhttp:\/\/www.etacom.org\/\n\n, May 1996."},{"key":"10_CR2","unstructured":"W.M. Farmer, J.D. Guttman, and V. Swarup. Security for Mobile Agents: Issues and Requirements. Proc. 19th National Information Systems Security Conference (NISSC 96), 1996, pp. 591\u2013597."},{"key":"10_CR3","unstructured":"R.S. Gray. Agent Tcl: A flexible and secure mobile-agent system. In M. Diekhans and M. Roseman, editors, Fourth Annual Tcl\/Tk Workshop (TCL 96), 1996, pp. 9\u201323."},{"key":"10_CR4","volume-title":"Proc. IEEE CompCon 96","author":"J. Tardo","year":"1996","unstructured":"J. Tardo and L. Valente. Mobile Agent Security and Telescript. Proc. IEEE CompCon 96, IEEE Computer Society Press, Los Alamitos, Calif., 1996."},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"D.B. Lange and M. Oshima. Java Agent API: Programming and Deploying Aglets with Java. to be published by Addision-Wesley, Fall 1997; a working draft \u201cProgramming Mobile Agents in Java\u201d is available at \nhttp:\/\/www.trl.ibm.co.jp\/aglets\/aglet-book\/index.html\n\n.","DOI":"10.1007\/3-540-63343-X_52"},{"key":"10_CR6","unstructured":"B. Sommers, Agents: Not Just for Bond Anymore. JavaWorld, \nhttp:\/\/www.javaworld.com\/javaworld\/jw-04-1997\/jw-04-agents.html\n\n, April 1997."},{"key":"10_CR7","unstructured":"B. Venners. The Architecture of Aglets JavaWorld, \nhttp:\/\/www.javaworld.com\/javaworld\/jw-04-1997\/jw-04-hood.html\n\n, April 1997."},{"key":"10_CR8","unstructured":"B. Venners. \u201cSolve Real Problems with Aglets, a Type of Mobile Agent. JavaWorld, \nhttp:\/\/www.javaworld.com\/javaworld\/jw-05-1997\/jw-05-hood.html\n\n, May 1997."},{"key":"10_CR9","unstructured":"D.B. Lange. Java Aglet Application Programming Interface (J-AAPI). White paper-draft no. 2, \nhttp:\/\/www.trl.ibm.co.jp\/aglets\/JAAPI-whitepaper.html\n\n."},{"issue":"5","key":"10_CR10","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/98.468361","volume":"2","author":"D. Chess","year":"1995","unstructured":"D. Chess et al. Itinerant Agents for Mobile Computing. IEEE Personal Communications, Vol. 2, No. 5, Oct. 1995, pp. 34\u201349.","journal-title":"IEEE Personal Communications"},{"key":"10_CR11","unstructured":"D. Chess. Things that Go Bump in the Net. \nhttp:\/\/www.research.ibm.com\/massive\/bump.html\n\n, 1995."},{"key":"10_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1007\/3-540-62803-7_23","volume-title":"Proc. First International Workshop on Mobile Agents (MA\u201997)","author":"H. Peine","year":"1997","unstructured":"H. Peine and T. Stolpmann. The Architecture of the Ara Platform for Mobile Agents. Proc. First International Workshop on Mobile Agents (MA\u201997), 1997, Lecture Notes in Computer Science No. 1219, Springer, pp. 50\u201361."},{"key":"10_CR13","unstructured":"C. Thirunavukkarasu, T. Finin, and J. Mayfield. Secret Agents-A Security Architecture for the KQML Agent Communication Lanaguage. Proc. Intelligent Information Agents Workshop held in conjunktion with Fourth Int\u2019l Conf. Information and Knowledge Management CIKM 95, Baltimore, Dec. 1995."},{"key":"10_CR14","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1109\/CMPCON.1997.584679","volume-title":"Proc. IEEE CompCon 97","author":"L. Gong","year":"1997","unstructured":"L. Gong. New Security Architectural Directions for Java. Proc. IEEE CompCon 97, IEEE Computer Society Press, Los Alamitos, Calif., 1997, pp. 97\u2013102."},{"key":"10_CR15","unstructured":"DARPA Workshop on Foundations for Secure Mobile Code. \nhttp:\/\/www.cs.nps.navy.mil\/research\/languages\/wkshp.html\n\n, Monterey, Calif., 26\u201328 March 1997."}],"container-title":["Lecture Notes in Computer Science","Mobile Agents and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-68671-1_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,3]],"date-time":"2020-04-03T18:10:19Z","timestamp":1585937419000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-68671-1_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540647928","9783540686712"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/3-540-68671-1_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]},"assertion":[{"value":"18 June 1998","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}