{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:56:18Z","timestamp":1725558978376},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540248439"},{"type":"electronic","value":"9783540318460"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-31846-0_15","type":"book-chapter","created":{"date-parts":[[2010,7,5]],"date-time":"2010-07-05T15:28:48Z","timestamp":1278343728000},"page":"254-271","source":"Crossref","is-referenced-by-count":3,"title":["Adaptive Access Control in Coordination-Based Mobile Agent Systems"],"prefix":"10.1007","author":[{"given":"Christine","family":"Julien","sequence":"first","affiliation":[]},{"given":"Jamie","family":"Payton","sequence":"additional","affiliation":[]},{"given":"Gruia-Catalin","family":"Roman","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1145\/2363.2433","volume":"7","author":"D. Gelernter","year":"1985","unstructured":"Gelernter, D.: Generative communication in Linda. ACM Transactions on Programming Languages and Systems\u00a07, 80\u2013112 (1985)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"15_CR2","unstructured":"Kaufman, J., Lehman, T.: OptimalGrid: The almaden SmartGrid project: Autonomous optimization of distributed computing on the grid. IEEE Task Force on Cluster Computing\u00a04 (2003)"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Wyckoff, P., McLaughry, S., Lehman, T., Ford, D.: TSpaces. IBM Systems Journal\u00a037 (1998)","DOI":"10.1147\/sj.373.0454"},{"key":"15_CR4","volume-title":"JavaSpaces Principles, Patterns, and Practice","author":"E. Freeman","year":"1999","unstructured":"Freeman, E., Hupfer, S., Arnold, K.: JavaSpaces Principles, Patterns, and Practice. Addison-Wesley, Reading (1999)"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Murphy, A.L., Picco, G.P., Roman, G.C.: Lime: A middleware for physical and logical mobility. In: Proceedings of the 21st International Conference on Distributed Computing Systems, pp. 524\u2013533 (2001)","DOI":"10.1109\/ICDSC.2001.918983"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Julien, C., Roman, G.C.: Egocentric context-aware programming in ad hoc mobile environments. In: Proceedings of the 10th International Symposium on the Foundations of Software Engineering (2002)","DOI":"10.1145\/587051.587056"},{"key":"15_CR7","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/4236.865084","volume":"4","author":"G. Cabri","year":"2000","unstructured":"Cabri, G., Leonardi, L., Zambonelli, F.: MARS: A programmable coordination architecture for mobile agents. Internet Computing\u00a04, 26\u201335 (2000)","journal-title":"Internet Computing"},{"key":"15_CR8","unstructured":"Moore, J.: Mobile code security techniques. Technical Report MIS-CIS-98-28, University of Pennsylvania (1998)"},{"key":"15_CR9","unstructured":"White, J.: Telescript technology: The foundation for the electronic marketplace. General Magic White Paper, General Magic, Inc. (1994)"},{"key":"15_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/3-540-68671-1_9","volume-title":"Mobile Agents and Security","author":"R.S. Gray","year":"1998","unstructured":"Gray, R.S., Kotz, D., Cybenko, G., Rus, D.: D\u2019Agents: Security in a multiple-language, mobile-agent system. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol.\u00a01419, pp. 154\u2013187. Springer, Heidelberg (1998)"},{"key":"15_CR11","unstructured":"Gray, R.: Agent tcl: A flexible and secure mobile-agent system. In: Proceedings of the 4th Annual Tcl\/Tk Workshop (1996)"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Necula, G.: Proof-carrying code. In: Proceedings of the Symposium on Principles of Programming Languages (1997)","DOI":"10.1145\/263699.263712"},{"key":"15_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/3-540-68671-1_4","volume-title":"Mobile Agents and Security","author":"T. Sander","year":"1998","unstructured":"Sander, T., Tschudin, C.: Protecting mobile agents against malicious hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol.\u00a01419, pp. 44\u201360. Springer, Heidelberg (1998)"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Borselius, N., Mitchell, C.J., Wilson, A.: Undetachable threshold signatures. In: Cryptography and Coding\u2014Proceedings of the 8th IMA International Conference. LNCS, vol.\u00a02360, pp. 239\u2013244. Springer, Heidelberg (2001)","DOI":"10.1007\/3-540-45325-3_21"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Papadimitratos, P., Haas, Z.: Secure data transmission in mobile ad hoc networks. In: Proceedings of the 2003 ACM Workshop on Wireless Security, pp. 41\u201350 (2003)","DOI":"10.1145\/941311.941318"},{"key":"15_CR16","unstructured":"National Center for Supercomputing Applications, Integrated Decision Technologies Group: SAMCat: A securable active metadata catalogue (2002)"},{"key":"15_CR17","unstructured":"Byrd, G., Gong, F., Sargor, C., Smith, T.: Yalta: A secure collaborative space for dynamic coalitions. In: IEEE 2nd SMC Information Assurance Workshop (2001)"},{"key":"15_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/3-540-45263-X_7","volume-title":"Coordination Languages and Models","author":"M. Cremonini","year":"2000","unstructured":"Cremonini, M., Omicini, A., Zambonelli, F.: Coordination and access control in open distributed agent systems: the TuCSoN approach. In: Porto, A., Roman, G.-C. (eds.) COORDINATION 2000. LNCS, vol.\u00a01906, pp. 99\u2013114. Springer, Heidelberg (2000)"},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Bryce, C., Oriol, M., Vitek, J.: A coordination model for agents based on secure spaces. In: Ciancarini, P., Wolf, A. (eds.) COORDINATION 2008. LNCS, vol.\u00a05052, pp. 4\u201320. Springer, Heidelberg (2008)","DOI":"10.1007\/3-540-48919-3_3"},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Handorean, R., Roman, G.C.: Secure servise provision in ad hoc networks. In: Proceedings of the 1st International Conference on Service Oriented Computing (2003)","DOI":"10.1007\/978-3-540-24593-3_25"},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Minsky, N., Minsky, Y., Ungureanu, V.: Safe tuplespace-based coordination in multi agent systems. Journal of Applied Artificial Intelligence\u00a015 (2001)","DOI":"10.1080\/08839510150204590"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Kang, P., Borcea, C., Xu, G., Saxena, A., Kremer, U., Iftode, L.: Smart messages: A distributed computing platform for networks of embedded systems. The Computer Journal Special Issue on Mobile and Pervasive Computing (to appear)","DOI":"10.1093\/comjnl\/47.4.475"},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Keoh, S.L., Lupu, E.: Towards flexible credential verification in mobile ad hoc networks. In: Proceedings of the ACM Workshop on Principles of Mobile Computing, pp. 58\u201365 (2002)","DOI":"10.1145\/584490.584503"},{"key":"15_CR24","doi-asserted-by":"crossref","unstructured":"Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communication Security, pp. 42\u201351 (2003)","DOI":"10.1145\/948109.948118"},{"key":"15_CR25","doi-asserted-by":"crossref","unstructured":"Weimerskirch, A., Thonet, G.: A distributed light-weight authentication model for ad hoc networks. In: Proceedings of the 4th International Conference on Information Security and Cryptology, pp. 341\u2013354 (2001)","DOI":"10.1007\/3-540-45861-1_26"},{"key":"15_CR26","unstructured":"Balfanz, D., Smetters, D.K., Stewart, P., Wong, H.C.: Talking to strangers: Authentication in ad hoc wireless networks. In: Network and Distributed System Security Symposium (2002)"}],"container-title":["Lecture Notes in Computer Science","Software Engineering for Multi-Agent Systems III"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-31846-0_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T23:28:24Z","timestamp":1605742104000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-31846-0_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540248439","9783540318460"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-31846-0_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}