{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:07:31Z","timestamp":1725566851805},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540234234"},{"type":"electronic","value":"9783540301783"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30178-3_22","type":"book-chapter","created":{"date-parts":[[2010,9,23]],"date-time":"2010-09-23T19:55:07Z","timestamp":1285271707000},"page":"234-243","source":"Crossref","is-referenced-by-count":1,"title":["MASS: A Mobile Agent Security Scheme for the Creation of Virtual Enterprises"],"prefix":"10.1007","author":[{"given":"Michelle S.","family":"Wangham","sequence":"first","affiliation":[]},{"given":"Joni","family":"Fraga","sequence":"additional","affiliation":[]},{"given":"Ricardo","family":"Schmidt","sequence":"additional","affiliation":[]},{"given":"Ricardo J.","family":"Rabelo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/978-3-540-24625-1_12","volume-title":"Software Engineering for Multi-Agent Systems II","author":"M.S. Wangham","year":"2004","unstructured":"Wangham, M.S., da Silva Fraga, J., Obelheiro, R.R., Jung, G., Fernandes, E.: Security mechanisms for mobile agent platforms based on spki\/sdsi chains of trust. In: Lucena, C., Garcia, A., Romanovsky, A., Castro, J., Alencar, P.S.C. (eds.) SELMAS 2003. LNCS, vol.\u00a02940, pp. 207\u2013224. Springer, Heidelberg (2004)"},{"key":"22_CR2","series-title":"Lecture Notes in Computer Science","volume-title":"Mobile Agents and Security","year":"1998","unstructured":"Vigna, G. (ed.): Mobile Agents and Security. LNCS, vol.\u00a01419. Springer, Heidelberg (1998)"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Rabelo, R., Wangham, M., Schmidt, R., Fraga, J.: Trust building in the creation of virtual enterprises in mobile agent-based architectures. In: 4Th IFIP Working Conference on Virtual Enterprise (2003)","DOI":"10.1007\/978-0-387-35704-1_7"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Jansen, W., Karygiannis, T.: Mobile agent security. Technical Report NIST Special Publication 800-19, National Institute os Standards and Technology (1999)","DOI":"10.6028\/NIST.SP.800-19"},{"key":"22_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-68671-1_1","volume-title":"Mobile Agents and Security","author":"D.M. Chess","year":"1998","unstructured":"Chess, D.M.: Security issues in mobile code systems. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol.\u00a01419, p. 1. Springer, Heidelberg (1998)"},{"key":"22_CR6","unstructured":"Elisson, C.: SPKI Requirements (RFC 2692). The Internet Engineering Task Force (1999), http:\/\/www.ietf.org\/rfc\/rfc2692.txt"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Camarinha-Matos, L., Afsarmanesh, H.: Dynamic virtual organizations, or not so dynamic? In: Third IFIP Working Conference on Virtual Enterprise (PROVE 2002), pp. 111\u2013124 (2002)","DOI":"10.1007\/978-0-387-35613-6_12"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Wangham, M.S., da Silva Fraga, J., Deitos, R., Fernandes, E.: Reposit\u00f3rios seguros de dados para protec\u00e3o de agentes m\u00f3veis contra plataformas maliciosas. In: IV Workshop em Seguranca de Sistemas Computacionais (2004) ((in portuguese))","DOI":"10.5753\/sbseg.2004.21226"},{"key":"22_CR9","unstructured":"OMG: Mobile agent facility specification. OMG Document 2000-01-02 (2000)"},{"key":"22_CR10","unstructured":"Karnik, N.: Security in Mobile Agent System. PhD thesis, University of Minnesota (1998), http:\/\/www.cs.umn.edu\/Ajanta"},{"key":"22_CR11","unstructured":"Morcos, A.: A java implementation of simple distributed security infrastructure. Master\u2019s thesis, Massachusetts Institute of Technology (1998)"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Karjoth, G., Asokan, N.,Gulcu, C.: Protecting the computing results of free-roaming agents. In: Proc. of the Second International Workshop on Mobile Agents (1998)","DOI":"10.1007\/BFb0057659"}],"container-title":["Lecture Notes in Computer Science","Mobility Aware Technologies and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30178-3_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,3]],"date-time":"2023-06-03T13:13:22Z","timestamp":1685798002000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30178-3_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540234234","9783540301783"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30178-3_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}