{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T13:40:06Z","timestamp":1743082806161,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319197272"},{"type":"electronic","value":"9783319197289"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-19728-9_3","type":"book-chapter","created":{"date-parts":[[2015,5,28]],"date-time":"2015-05-28T18:36:29Z","timestamp":1432838189000},"page":"27-39","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Security of Mobile Agent Platforms Using Access Control and Cryptography"],"prefix":"10.1007","author":[{"given":"Hind","family":"Idrissi","sequence":"first","affiliation":[]},{"given":"El Mamoun","family":"Souidi","sequence":"additional","affiliation":[]},{"given":"Arnaud","family":"Revel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,29]]},"reference":[{"key":"3_CR1","unstructured":"Giovanni Caire, F.C.: JADE tutorial: jade programming for beginners. TILAB (2007)"},{"key":"3_CR2","unstructured":"Foundation for Intelligent Physical Agents, Geneva, Switzerland, FIPA ACL Message Structure Specification (2003)"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Jansen, W., Karygiannis, T.: Mobile Agent Security, pp. 800\u2013819. NIST Special Publication (1999)","DOI":"10.6028\/NIST.SP.800-19"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Jung, Y., Kim, M., Masoumzadeh, A., Joshi, J.B.: A survey of security issue in multi-agent systems. Artificial Intelligence Review 37(3), 239\u2013260 (2012)","DOI":"10.1007\/s10462-011-9228-8"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Borselius, N.: Mobile agent security. Electron. Commun. Eng. J. 14(5), 211\u2013218 (2002)","DOI":"10.1049\/ecej:20020504"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Pirzadeh, H., Dub, D., Hamou-Lhadj, A.: An extended proof-carrying code framework for security enforcement. In: Transactions on Computational Science XI, pp. 249\u2013269. Springer, Berlin (2010)","DOI":"10.1007\/978-3-642-17697-5_13"},{"issue":"3","key":"3_CR7","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1080\/17445760500356205","volume":"21","author":"C Cao","year":"2006","unstructured":"Cao, C., Lu, J.: Path-history-based Access Control for Mobile Agents. International Journal of Parallel, Emergent and Distributed Systems 21(3), 215\u2013225 (2006)","journal-title":"International Journal of Parallel, Emergent and Distributed Systems"},{"issue":"2","key":"3_CR8","first-page":"153","volume":"12","author":"TA Tsiligiridis","year":"2004","unstructured":"Tsiligiridis, T.A.: Security for mobile agents: privileges and state appraisal mechanism. Neural Parallel Sci. Comput. 12(2), 153\u2013162 (2004)","journal-title":"Neural Parallel Sci. Comput."},{"key":"3_CR9","unstructured":"Tuohimaa, S., Laine, M., Leppnen, V.: Dynamic rights in model-carrying code. In: Proceedings of the International Conference on Computer Systems and Technologies, pp. 1\u20137 (2006)"},{"issue":"9","key":"3_CR10","doi-asserted-by":"publisher","first-page":"296","DOI":"10.15373\/2249555X\/SEPT2013\/87","volume":"3","author":"V Arun","year":"2013","unstructured":"Arun, V., Shunmuganathan, K.L.: Secure sand-box for mobile computing host with shielded mobile agent. Indian J. Appl. Res. 3(9), 296\u2013297 (2013)","journal-title":"Indian J. Appl. Res."},{"key":"3_CR11","unstructured":"Aumasson, J.: On the pseudo-random generator ISAAC. IACR Cryptology ePrint Archive, 2006:438"},{"issue":"4","key":"3_CR12","doi-asserted-by":"publisher","first-page":"410","DOI":"10.7763\/IJCEE.2013.V5.742","volume":"5","author":"A Jaffar","year":"2013","unstructured":"Jaffar, A., Martinez, C.J.: Detail power analysis of the SHA-3 hashing algorithm candidates on xilinx spartan-3E. Int. J. Comput. Electr. Eng. 5(4), 410\u2013413 (2013)","journal-title":"Int. J. Comput. Electr. Eng."},{"issue":"6","key":"3_CR13","doi-asserted-by":"publisher","first-page":"570","DOI":"10.1109\/LCOMM.2005.1437374","volume":"9","author":"RW Phan","year":"2005","unstructured":"Phan, R.W.: Fixing the integrated Diffie-Hellman-DSA key exchange protocol. IEEE Commun. Lett. 9(6), 570\u2013572 (2005)","journal-title":"IEEE Commun. Lett."},{"issue":"3","key":"3_CR14","first-page":"407","volume":"8","author":"M Ennahbaoui","year":"2014","unstructured":"Ennahbaoui, M., Elhajji, S.: Swot analysis of access control models. Int. J. Secur. Appl. 8(3), 407\u2013424 (2014)","journal-title":"Int. J. Secur. Appl."},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Blakley, G.R., Kabatiansky, G.: Shamirs threshold scheme. In: Encyclopedia of Cryptography and Security, pp. 1193\u20131194. Springer, US (2011)","DOI":"10.1007\/978-1-4419-5906-5_390"},{"key":"3_CR16","unstructured":"Announcing the Advanced Encryption Standard (AES). Federal Information Processing Standards Publication 197, NIST (2001)"},{"issue":"2","key":"3_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4304\/jcm.3.2.1-12","volume":"3","author":"L Ismail","year":"2008","unstructured":"Ismail, L.: A secure mobile agents platform. J. Commun. 3(2), 1\u201312 (2008)","journal-title":"J. Commun."}],"container-title":["Smart Innovation, Systems and Technologies","Agent and Multi-Agent Systems: Technologies and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-19728-9_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,24]],"date-time":"2023-01-24T12:13:01Z","timestamp":1674562381000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-19728-9_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319197272","9783319197289"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-19728-9_3","relation":{},"ISSN":["2190-3018","2190-3026"],"issn-type":[{"type":"print","value":"2190-3018"},{"type":"electronic","value":"2190-3026"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"29 May 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}