{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T00:53:55Z","timestamp":1742950435373,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540212508"},{"type":"electronic","value":"9783540247159"}],"license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24715-9_23","type":"book-chapter","created":{"date-parts":[[2010,7,28]],"date-time":"2010-07-28T00:14:53Z","timestamp":1280276093000},"page":"266-279","source":"Crossref","is-referenced-by-count":1,"title":["Risky Business: Motivations for Markets in Programmable Networks"],"prefix":"10.1007","author":[{"given":"Ian","family":"Wakeman","sequence":"first","affiliation":[]},{"given":"David","family":"Ellis","sequence":"additional","affiliation":[]},{"given":"Tim","family":"Owen","sequence":"additional","affiliation":[]},{"given":"Julian","family":"Rathke","sequence":"additional","affiliation":[]},{"given":"Des","family":"Watson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"23_CR1","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1145\/332799.332893","volume":"18","author":"B. Schwartz","year":"2000","unstructured":"Schwartz, B., Jackson, A.W., Timothy Strayer, W., Zhou, W., Dennis Rockwell, R., Partbridge, C.: Smart packets: applying active networks to network management. ACM Transactions on Computer Systems\u00a018(1), 67\u201388 (2000)","journal-title":"ACM Transactions on Computer Systems"},{"key":"23_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/3-540-68671-1_3","volume-title":"Mobile Agents and Security","author":"D. Volpano","year":"1998","unstructured":"Volpano, D., Smith, G.: Language issues in mobile program security. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol.\u00a01419, p. 25. Springer, Heidelberg (1998)"},{"key":"23_CR3","unstructured":"Alexander, D.: Alien: A Generalized Computing Model of Active Networks. PhD thesis, University of Pennsylvania (1998)"},{"key":"23_CR4","series-title":"Electronic Notes in Theoretical Computer Science","volume-title":"Higher Order Operational Techniques in Semantics","author":"P. Kakkar","year":"1999","unstructured":"Kakkar, P., Hicks, M., Moore, J.T., Gunter, C.A.: Specifying the PLAN networking programming language. In: Higher Order Operational Techniques in Semantics, September 1999. Electronic Notes in Theoretical Computer Science, vol.\u00a026, Elsevier, Amsterdam (1999)"},{"key":"23_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-540-48507-0_3","volume-title":"Active Networks","author":"P. Menage","year":"1999","unstructured":"Menage, P.: RCANE: A Resource Controlled Framework for Active Network Services. In: Covaci, S. (ed.) IWAN 1999. LNCS, vol.\u00a01653, pp. 25\u201337. Springer, Heidelberg (1999)"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Czajkowski, G., von Eicken, T.: JRes: A resource accounting interface for Java. In: Proceedings of OOPSLA 1998, pp. 21\u201335 (1998)","DOI":"10.1145\/286936.286944"},{"issue":"7","key":"23_CR7","doi-asserted-by":"publisher","first-page":"1280","DOI":"10.1109\/49.536480","volume":"14","author":"I.M. Leslie","year":"1996","unstructured":"Leslie, I.M., McAuley, D., Black, R., Roscoe, T., Barham, P.T., Evers, D., Fairbairns, R., Hyden, E.: The design and implementation of an operating system to support distributed multimedia applications. IEEE Journal of Selected Areas in Communications\u00a014(7), 1280\u20131297 (1996)","journal-title":"IEEE Journal of Selected Areas in Communications"},{"key":"23_CR8","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1145\/319151.319166","volume-title":"ACM Symposium on Operating Systems Principles","author":"R. Morris","year":"1999","unstructured":"Morris, R., Kohler, E., Jannotti, J., Kaashoek, M.F.: The click modular router. In: ACM Symposium on Operating Systems Principles, Charleston, South Carolina, pp. 217\u2013231. ACM Press, New York (1999)"},{"key":"23_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/3-540-36199-5_20","volume-title":"Active Networks","author":"S. Schmid","year":"2002","unstructured":"Schmid, S., Chart, T., Sifalakis, M., Scott, A.: Flexible, dynamic and scalable service composition for active routers. In: Sterbenz, J.P.G., Takada, O., Tschudin, C.F., Plattner, B. (eds.) IWAN 2002. LNCS, vol.\u00a02546, pp. 253\u2013266. Springer, Heidelberg (2002)"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Litzkow, M., Livny, M., Mutka, M.: Condor \u2014 a hunter of idle workstations. In: Proceedings of the Eighth Conference on Distributed Computing Systems, San Jose, California (June 1988)","DOI":"10.1109\/DCS.1988.12507"},{"issue":"2","key":"23_CR11","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1109\/32.121753","volume":"18","author":"C.A. Waldspurger","year":"1992","unstructured":"Waldspurger, C.A., Hogg, T., Huberman, B.A., Kephart, J.O., Scott Stornetta, W.: Spawn: A distributed computational economy. Software Engineering\u00a018(2), 103\u2013117 (1992)","journal-title":"Software Engineering"},{"key":"23_CR12","unstructured":"Amir, Y., Awerbuch, B., Borgstrom, R.S.: The java market: Transforming the internet into a metacomputer. Technical Report Technical Report CNDS-98-1, Johns Hopkins University (1998)"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"Buyya, R., Abramson, D., Giddy, J.: Nimrod\/g: An architecture for a resource management and scheduling system in a global computational grid. In: Proceedings of the 4th International Conference on High Performance Computing in the Asia Pacific Region (May 2000)","DOI":"10.1109\/HPC.2000.846563"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Buyya, R., Abramson, D., Giddy, J., Stockinger, H.: Economic models for resource management and scheduling in grid computing. The Journal of Concurrency and Computation: Practice and Experience, CCPE ( May 2002)","DOI":"10.1002\/cpe.690"},{"key":"23_CR15","volume-title":"Market-Based Control: A Paradigm for Distributed Resource Allocation","author":"D. Ferguson","year":"1996","unstructured":"Ferguson, D., Nikolaou, C., Sairamesh, J., Yemini, Y.: Economic models for allocating resources in computer systems. In: Market-Based Control: A Paradigm for Distributed Resource Allocation, World Scientific, Singapore (1996)"},{"key":"23_CR16","doi-asserted-by":"publisher","first-page":"1969","DOI":"10.1016\/S0005-1098(99)00135-1","volume":"35","author":"R.J. Gibbens","year":"1999","unstructured":"Gibbens, R.J., Kelly, F.P.: Resource pricing and the evolution of congestion control. Automatica\u00a035, 1969\u20131985 (1999)","journal-title":"Automatica"},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"Cocchi, R., Shenker, S., Estrin, D., Zhang, L.: Pricing in computer networks: Motivation, formulation, and example. IEEE\/ACM Transactions on Networking\u00a01, (December 1993)","DOI":"10.1109\/90.266050"},{"key":"23_CR18","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1109\/90.993302","volume":"10","author":"X.-R. Cao","year":"2002","unstructured":"Cao, X.-R., Shen, H., Milito, R., Wirth, P.: Internet pricing with a game theoretical approach: Concepts and examples. IEEE\/ACM Transactions on Networking\u00a010, 208\u2013216 (2002)","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"23_CR19","doi-asserted-by":"crossref","unstructured":"Varian, H.: Differential pricing and efficiency. First Monday\u00a01(2) (August 1996)","DOI":"10.5210\/fm.v1i2.473"},{"key":"23_CR20","volume-title":"Introduction to Multi Agent Systems","author":"M. Wooldridge","year":"2002","unstructured":"Wooldridge, M.: Introduction to Multi Agent Systems. John Wiley & Sons, Chichester (2002)"},{"issue":"1","key":"23_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/505452.505453","volume":"20","author":"K. Fu","year":"2002","unstructured":"Fu, K., Frans Kaashoek, M., Mazi\u00e8res, D.: Fast and secure distributed read-only file system. Computer Systems\u00a020(1), 1\u201324 (2002)","journal-title":"Computer Systems"},{"key":"23_CR22","volume-title":"Applied Cryptography: Protocols, Algorithms","author":"B. Schneier","year":"1995","unstructured":"Schneier, B.: Applied Cryptography: Protocols, Algorithms, 2nd edn. John Wiley & Sons, Chichester (1995)","edition":"2"},{"key":"23_CR23","doi-asserted-by":"crossref","unstructured":"Wakeman, I., Jeffrey, A., Owen, T., Pepper, D.: Safetynet: A language-based approach to programmable networks. Computer Networks and ISDN Systems\u00a036(1) (June 2001)","DOI":"10.1016\/S1389-1286(01)00154-2"},{"key":"23_CR24","volume-title":"Game Theory","author":"D. Fudenberg","year":"1991","unstructured":"Fudenberg, D., Tirole, J.: Game Theory. MIT Press, Cambridge (1991)"},{"key":"23_CR25","doi-asserted-by":"crossref","unstructured":"Wakeman, I., Ellis, D., Owen, T., Rathke, J., Watson, D.: Risky business: Motivations for markets in programmable networks. Computer science technical report, University of Sussex (2003)","DOI":"10.1007\/978-3-540-24715-9_23"},{"key":"23_CR26","unstructured":"Gravelle, H., Rees, R.: Microeconomics, Longman (1992)"},{"key":"23_CR27","doi-asserted-by":"crossref","unstructured":"Feigenbaum, J., Shenker, S.: Distributed algorithmic mechanism design: Recent results and future directions. In: Proceedings of the 6th International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications, New York, pp. 1\u201313 (2002)","DOI":"10.1145\/570810.570812"},{"key":"23_CR28","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1016\/S0378-4371(99)00291-5","volume":"2272","author":"A.-L. Barabasi","year":"1999","unstructured":"Barabasi, A.-L., Albert, R., Jeong, H.: Mean-field theory for scale-free random networks. Physica A\u00a02272, 173\u2013187 (1999)","journal-title":"Physica A"},{"key":"23_CR29","unstructured":"Zacharia, G., Moukas, A., Maes, P.: Collaborative reputation systems in electronic marketplaces. In: Proceedings of the 32nd Hawaii International Conference on System Sciences (1999)"},{"key":"23_CR30","doi-asserted-by":"crossref","unstructured":"Cornelli, F., Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., Samarati, P.: Choosing reputable servents in a p2p network. In: Proc. of the Eleventh International World Wide Web Conference, Honolulu, Hawaii (May 2002)","DOI":"10.1145\/511446.511496"},{"key":"23_CR31","doi-asserted-by":"crossref","unstructured":"Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The eigentrust algorithm for reputation management in p2p networks. In: Proceedings of the Twelfth International World Wide Web Conference (2003)","DOI":"10.1145\/775152.775242"},{"key":"23_CR32","doi-asserted-by":"crossref","unstructured":"Adamic, L., Lukose, R.M., Puniyani, A.R., Huberman, B.A.: Search in powerlaw networks. Phys. Rev. E\u00a064 (2001)","DOI":"10.1103\/PhysRevE.64.046135"},{"key":"23_CR33","doi-asserted-by":"crossref","unstructured":"Kim, B.J., No Yoon, C., Han, S.K., Jeong, H.: Path finding strategies in scale-free networks. Physical Review E\u00a065(027103) (2002)","DOI":"10.1103\/PhysRevE.65.027103"},{"key":"23_CR34","doi-asserted-by":"crossref","unstructured":"Rowstron, A., Druschel, P.: Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. In: IFIP\/ACM International Conference on Distributed Systems Platforms (Middleware), Heidelberg, Germany, November 2001, pp. 329\u2013350 (2001)","DOI":"10.1007\/3-540-45518-3_18"},{"key":"23_CR35","unstructured":"Reed, D., Pratt, I., Menage, P., Early, S., Stratford, N.: Xenoservers; accounted execution of untrusted code. In: IEEE Hot Topics in Operating Systems (HotOS) VII (March 1999)"}],"container-title":["Lecture Notes in Computer Science","Active Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24715-9_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T20:07:31Z","timestamp":1635797251000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24715-9_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540212508","9783540247159"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24715-9_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}