{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:28:34Z","timestamp":1725560914365},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540208273"},{"type":"electronic","value":"9783540245919"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24591-9_5","type":"book-chapter","created":{"date-parts":[[2010,7,29]],"date-time":"2010-07-29T03:36:56Z","timestamp":1280374616000},"page":"55-68","source":"Crossref","is-referenced-by-count":0,"title":["Reliable Cascaded Delegation Scheme for Mobile Agent Environments"],"prefix":"10.1007","author":[{"given":"Hyun-suk","family":"Lee","sequence":"first","affiliation":[]},{"given":"Hyeog Man","family":"Kwon","sequence":"additional","affiliation":[]},{"given":"Young Ik","family":"Eom","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"Harrison, C., Chess, D., Kershenbaum, A.: Mobile Agents: Are they a good idea? Research Report (1987), IBM Research Division (1994)"},{"key":"5_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/3-540-68671-1_7","volume-title":"Mobile Agents and Security","author":"S. Berkovits","year":"1998","unstructured":"Berkovits, S., Guttman, J., Swarup, V.: Authentication for mobile agents. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol.\u00a01419, pp. 114\u2013136. Springer, Heidelberg (1998)"},{"key":"5_CR3","unstructured":"Farmer, W., Guttman, J., Swarup, V.: Security for mobile agents: issues and requirements. Computer Communications: Special Issue on Advances in Research and Application of Network Security (1996)"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Jansen, W.: Countermeasures for mobile agent security. Computer Communications: Special Issue on Advances in Research and Application of Network Security (2000)","DOI":"10.1016\/S0140-3664(00)00253-X"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Corradi, A., Montanari, R., Stefanelli, C.: Mobile agents protection in the internet environment. In: Proc. 23th Annual International Computer Software and Applications Conference, pp. 80\u201385 (1999)","DOI":"10.1109\/CMPSAC.1999.812680"},{"issue":"5","key":"5_CR6","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/4236.877485","volume":"4","author":"U. Wilhelm","year":"2000","unstructured":"Wilhelm, U., Stamann, S., Buttyan, L.: A pessimistic approach to trust in mobile agent platforms. IEEE Internet Computing\u00a04(5), 40\u201348 (2000)","journal-title":"IEEE Internet Computing"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Ding, Y., Petersen, H.: A new approach for delegation using hierarchical delegation tokens. In: Proc. 2nd Conference on Computer and Communications Security, pp. 128\u2013143 (1996)","DOI":"10.1007\/978-0-387-35083-7_12"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Vogt, G.: Delegation of tasks and rights. In: Proc. 12th Annual IFIP\/IEEE International Workshop on Distributed systems: Operations & Management, pp. 327\u2013337 (2001)","DOI":"10.3990\/2.28"},{"issue":"4","key":"5_CR9","doi-asserted-by":"publisher","first-page":"706","DOI":"10.1145\/155183.155225","volume":"15","author":"M. Abadi","year":"1993","unstructured":"Abadi, M., Burrows, M., Lampson, B., Plotkin, G.: A calculus for access control in distributed systems. ACM Transactions on Programming Language and Systems\u00a015(4), 706\u2013734 (1993)","journal-title":"ACM Transactions on Programming Language and Systems"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Lampson, B., Abadi, M., Burrows, M., Wobber, E.: Authentication in distributed systems: theory and practice. In: Proc. 13th ACM Symposium on Operating Systems Principles, pp. 165\u2013182 (1991)","DOI":"10.1145\/121132.121160"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24591-9_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T19:41:10Z","timestamp":1559331670000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24591-9_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540208273","9783540245919"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24591-9_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}