{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,2]],"date-time":"2025-03-02T05:44:57Z","timestamp":1740894297740,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540410522"},{"type":"electronic","value":"9783540453475"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/978-3-540-45347-5_8","type":"book-chapter","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T05:39:39Z","timestamp":1294378779000},"page":"86-98","source":"Crossref","is-referenced-by-count":3,"title":["Secure Dynamic Reconfiguration of Scalable CORBA Systems with Mobile Agents"],"prefix":"10.1007","author":[{"given":"Fabio","family":"Kon","sequence":"first","affiliation":[]},{"given":"Binny","family":"Gill","sequence":"additional","affiliation":[]},{"given":"Manish","family":"Anand","sequence":"additional","affiliation":[]},{"given":"Roy","family":"Campbell","sequence":"additional","affiliation":[]},{"given":"M. Dennis","family":"Mickunas","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Baldi, M., Picco, G.: Evaluating the Tradeoffs of Mobile Code Design Paradigms in Network Management Applications. In: Proc. 20th Int. Conf. Software Engineering, April 1998, pp. 146\u2013155 (1998)","DOI":"10.1109\/ICSE.1998.671111"},{"volume-title":"CAMELOT and AVALON: A Distributed Transaction Facility","year":"1991","key":"8_CR2","unstructured":"Eppinger, J.L., Mummert, L.B., Spector, A.Z. (eds.): CAMELOT and AVALON: A Distributed Transaction Facility. Morgan Kaufmann Pub, San Francisco (1991)"},{"key":"8_CR3","volume-title":"Transaction Processing: Concepts and Techniques","author":"J. Gray","year":"1993","unstructured":"Gray, J., Reuter, A.: Transaction Processing: Concepts and Techniques. Morgan Kaufmann Publishers, San Mateo (1993)"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Ismail, L., Hagimont, D.: A Performance Evaluation of the Mobile Agent Paradigm. In: Proceedings of OOPSLA 1999, Denver, November 1999, pp. 306\u2013313 (1999)","DOI":"10.1145\/320385.320415"},{"key":"8_CR5","unstructured":"Jain, P., Schmidt, D.C.: Dynamically Configuring Communication Services with the Service Configuration Pattern. C++ Report\u00a09(6) (June 1997)"},{"key":"8_CR6","unstructured":"Kon, F., Campbell, R., et al.: A Component-Based Architecture for Scalable Distributed Multimedia. In: Proc. 14th ICAST, Naperville, April 1998, pp. 121\u2013135 (1998)"},{"key":"8_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/3-540-45559-0_7","volume-title":"Middleware 2000","author":"F. Kon","year":"2000","unstructured":"Kon, F., Rom\u00e1n, M., et al.: Monitoring, Security, and Dynamic Configuration with the dynamicTAO Reflective ORB. In: Coulson, G., Sventek, J. (eds.) Middleware 2000. LNCS, vol.\u00a01795, pp. 121\u2013143. Springer, Heidelberg (2000)"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Linn, J.: The Generic Security Service Application Program Interface (GSS API). Technical Report Internet RFC 2078, Network Working Group (January 1997)","DOI":"10.17487\/rfc2078"},{"key":"8_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/3-540-68671-1_5","volume-title":"Mobile Agents and Security","author":"G.C. Necula","year":"1998","unstructured":"Necula, G.C., Lee, P.: Safe, Untrusted Agents Using Proof-carrying Code. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol.\u00a01419, pp. 61\u201391. Springer, Heidelberg (1998)"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Puliafito, A., Riccobene, S., Scarpa, M.: An Analytical Comparison of the Client-Sever, Remote Evaluation, and Mobile Agents Paradigms. In: Proc. ASA\/MA 1999, October 1999, pp. 278\u2013292 (1999)","DOI":"10.1109\/ASAMA.1999.805420"},{"volume-title":"Fourth International Conference on Configurable Distributed Systems","year":"1998","key":"8_CR11","unstructured":"Purtilo, J., Cole, R., Schlichting, R. (eds.): Fourth International Conference on Configurable Distributed Systems. IEEE, Los Alamitos (1998)"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Ranganathan, M., Schall, V., Galtier, V., Montgomery, D.: Mobile Streams: A Middleware for Reconfigurable Distributed Scripting. In: Proc. ASA\/MA 1999, October 1999, pp. 162\u2013175 (1999)","DOI":"10.1109\/ASAMA.1999.805402"},{"issue":"2","key":"8_CR13","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-Based Access Control Models. IEEE Computer\u00a029(2), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Silva, F.A., Popescu-Zeletin, R.: An Approach for Providing Mobile Agent Fault Tolerance. In: Proc. Second Int. Workshop on Mobile Agents, September 1998, pp. 14\u201325 (1998)","DOI":"10.1007\/BFb0057645"},{"key":"8_CR15","series-title":"Lecture Notes in Computer Science","volume-title":"Mobile Agents and Security","year":"1998","unstructured":"Vigna, G. (ed.): Mobile Agents and Security. LNCS, vol.\u00a01419. Springer, Heidelberg (1998)"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Vitek, J., Bryce, C.: The JavaSeal Mobile Agent Kernel. In: Proc. ASA\/MA 1999, October 1999, pp. 103\u2013116 (1999)","DOI":"10.1109\/ASAMA.1999.805397"}],"container-title":["Lecture Notes in Computer Science","Agent Systems, Mobile Agents, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-45347-5_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T13:51:38Z","timestamp":1740837098000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-45347-5_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540410522","9783540453475"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-45347-5_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2000]]}}}