{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T20:40:06Z","timestamp":1747168806057,"version":"3.40.5"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319125732"},{"type":"electronic","value":"9783319125749"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-12574-9_9","type":"book-chapter","created":{"date-parts":[[2014,11,21]],"date-time":"2014-11-21T13:38:31Z","timestamp":1416577111000},"page":"97-107","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Mobile Agents Based on Virtual Machines to Protect Sensitive Information"],"prefix":"10.1007","author":[{"given":"Bernhard","family":"Katzmarski","sequence":"first","affiliation":[]},{"given":"Gunnar","family":"Schomaker","sequence":"additional","affiliation":[]},{"given":"Wolfgang","family":"Nebel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,18]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Balan, R.K., Satyanarayanan, M., Park, S.Y., Okoshi, T.: Tactics-based remote execution for mobile computing. In: Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, MobiSys \u201903, pp. 273\u2013286. ACM, New York (2003)","DOI":"10.1145\/1066116.1066125"},{"key":"9_CR2","unstructured":"Bouchenak, S., Hagimont, D., De Palma, N.: Efficient java thread serialization. In: Proceedings of the 2nd International Conference on Principles and Practice of Programming in Java, PPPJ \u201903, pp. 35\u201339. Computer Science Press Inc., New York (2003)"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Caceres, R., Carter, C., Narayanaswami, C., Raghunath, M.: Reincarnating pcs with portable soulpads. In: Proceedings of the 3rd International Conference on Mobile Systems, Applications, and Services, MobiSys \u201905, pp. 65\u201378. ACM, New York (2005)","DOI":"10.1145\/1067170.1067179"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Chun, B.-G., Ihm, S., Maniatis, P., Naik, M., Patti, A.: Clonecloud: elastic execution between mobile device and cloud. In: Proceedings of the Sixth Conference on Computer Systems, EuroSys \u201911, pp. 301\u2013314. ACM, New York (2011)","DOI":"10.1145\/1966445.1966473"},{"key":"9_CR5","unstructured":"Coppola, M., Grammatikakis, M., Kornaros, G., Spyridakis, A.: Trusted computing on heterogeneous embedded systems-on-chip with virtualization and memory protection. In: The Fourth International Conference on Cloud Computing, GRIDs, and Virtualization, CLOUD COMPUTING 2013, pp. 225\u2013229 (2013)"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Cuervo, E., Balasubramanian, A., Cho, D.-K., Wolman, A., Saroiu, S., Chandra, R., Bahl, P.: Maui: making smartphones last longer with code offload. In: Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services, MobiSys \u201910, pp. 49\u201362. ACM, New York (2010)","DOI":"10.1145\/1814433.1814441"},{"key":"9_CR7","unstructured":"Flinn, J., Park, S., Satyanarayanan, M.: Balancing performance, energy, and quality in pervasive computing. In: Proceedings of the 22nd International Conference on Distributed Computing Systems, ICDCS \u201902, pp. 217\u2013226. IEEE Computer Society, Washington, DC (2002)"},{"key":"9_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/978-3-642-20465-4_9","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2011","author":"C Gentry","year":"2011","unstructured":"Gentry, C., Halevi, S.: Implementing gentry\u2019s fully-homomorphic encryption scheme. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 129\u2013148. Springer, Heidelberg (2011)"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Hoyer, M., Schr\u00f6der, K., Schlitt, D., Nebel, W.: Proactive dynamic resource management in virtualized data centers. In: Proceedings of the 2nd International Conference on Energy-Efficient Computing and Networking, e-Energy \u201911, pp. 11\u201320. ACM, New York (2011)","DOI":"10.1145\/2318716.2318719"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Kozuch, M., Satyanarayanan, M.: Internet suspend\/resume. In: Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications, pp. 40\u201346. IEEE (2002)","DOI":"10.1109\/MCSA.2002.1017484"},{"issue":"SI","key":"9_CR11","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1145\/844128.844162","volume":"36","author":"S Osman","year":"2002","unstructured":"Osman, S., Subhraveti, D., Su, G., Nieh, J.: The design and implementation of zap: a system for migrating computing environments. SIGOPS Oper. Syst. Rev. 36(SI), 361\u2013376 (2002)","journal-title":"SIGOPS Oper. Syst. Rev."},{"issue":"23","key":"9_CR12","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1016\/j.scico.2007.07.009","volume":"70","author":"R Quitadamo","year":"2008","unstructured":"Quitadamo, R., Cabri, G., Leonardi, L.: Mobile jikesrvm: a framework to support transparent java thread migration. Sci. Comput. Program. 70(23), 221\u2013240 (2008). Special Issue on Principles and Practices of Programming in Java (PPPJ 2006)","journal-title":"Sci. Comput. Program."},{"issue":"4","key":"9_CR13","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MPRV.2009.82","volume":"8","author":"M Satyanarayanan","year":"2009","unstructured":"Satyanarayanan, M., Bahl, P., Caceres, R., Davies, N.: The case for vm-based cloudlets in mobile computing. IEEE Pervasive Comput. 8(4), 14\u201323 (2009)","journal-title":"IEEE Pervasive Comput."},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Su, L., Courcambeck, S., Guillemin, P., Schwarz, C., Pacalet, R.: Secbus: operating system controlled hierarchical page-based memory bus protection. In: Proceedings of the Conference on Design, Automation and Test in Europe, DATE \u201909, pp. 570\u2013573. European Design and Automation Association, Leuven (2009)","DOI":"10.1109\/DATE.2009.5090729"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Suezawa, T.: Persistent execution state of a java virtual machine. In: Proceedings of the ACM 2000 Conference on Java Grande, JAVA \u201900, pp. 160\u2013167. ACM, New York (2000)","DOI":"10.1145\/337449.337536"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Thuemmler, C., Mueller, J., Covaci, S., Magedanz, T., de Panfilis, S., Jell, T., Gavras, A.: Applying the software-to-data paradigm in next generation e-health hybrid clouds. In: 2013 Tenth International Conference on Information Technology: New Generations (ITNG), pp. 459\u2013463 (2013)","DOI":"10.1109\/ITNG.2013.77"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Vigna, G.: Mobile agents: ten reasons for failure. In: Proceedings of the 2004 IEEE International Conference on Mobile Data Management, pp. 298\u2013299. IEEE (2004)","DOI":"10.1109\/MDM.2004.1263077"},{"key":"9_CR18","unstructured":"Wang, J.: Survey of state-of-the-art in inter-vm communication mechanisms (2009)"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Young, C., Lakshman, Y.N., Szymanski, T., Reppy, J., Presotto, D., Pike, R., Narlikar, G., Mullender, S., Grosse, E.: Protium, an infrastructure for partitioned applications. In: Proceedings of the Eighth Workshop on Hot Topics in Operating Systems, pp. 47\u201352 (2001)","DOI":"10.1109\/HOTOS.2001.990060"}],"container-title":["Communications in Computer and Information Science","Cyber Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12574-9_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T20:12:42Z","timestamp":1747167162000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12574-9_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319125732","9783319125749"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12574-9_9","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"18 November 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}