{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:09:30Z","timestamp":1725574170328},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540662389"},{"type":"electronic","value":"9783540485070"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/978-3-540-48507-0_30","type":"book-chapter","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T23:26:27Z","timestamp":1294442787000},"page":"330-344","source":"Crossref","is-referenced-by-count":3,"title":["Agent Based Security for the Active Network Infrastructure"],"prefix":"10.1007","author":[{"given":"Stamatis","family":"Karnouskos","sequence":"first","affiliation":[]},{"given":"Ingo","family":"Busse","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Covaci","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","unstructured":"Adam, C.M., Huard, J.-F., Lazar, A.A., Lim, K.-S., Nandikesan, M., Shim, E.: Proposal for Standardization of ATM Binding Interface Base 2.1. submitted to P1520 (January 1999)"},{"key":"30_CR2","unstructured":"Mobile Agent System Interoperability Facility, \n                    \n                      http:\/\/www.fokus.gmd.de\/research\/cc\/ima\/masif\/"},{"key":"30_CR3","unstructured":"OMG Web Site: \n                    \n                      http:\/\/www.omg.org\/"},{"key":"30_CR4","unstructured":"The KeyNote Trust-Management System, \n                    \n                      http:\/\/www.cis.upenn.edu\/~angelos\/keynote.html"},{"key":"30_CR5","unstructured":"Simple Public Key Infrastructure, \n                    \n                      http:\/\/www.ietf.org\/html.charters\/spki-charter.html"},{"key":"30_CR6","unstructured":"Yellin, F.: Low Level Security in Java (1997), deleted from \n                    \n                      www.javasoft.com"},{"key":"30_CR7","unstructured":"Venners, B.: Security and the Class Verifier. JavaWorld (October 1997), \n                    \n                      http:\/\/www.javaworld.com\/javaworld\/jw-10-1997\/"},{"key":"30_CR8","unstructured":"Venners, B.: Security and the Class Loader Architecture. JavaWorld (Septermber 1997), \n                    \n                      http:\/\/www.javaworld.com\/javaworld\/jw-09-1997\/"},{"key":"30_CR9","unstructured":"Venners, B.: Java Security: How to Install the Security Manager and Customize your Security Policy. JavaWorld (November 1997), \n                    \n                      http:\/\/www.javaworld.com\/javaworld\/jw-11-1997\/"},{"key":"30_CR10","unstructured":"IKV++ GmbH - Grasshopper, \n                    \n                      http:\/\/www.ikv.de\/products\/grasshopper"}],"container-title":["Lecture Notes in Computer Science","Active Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-48507-0_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,23]],"date-time":"2019-03-23T12:25:57Z","timestamp":1553343957000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-48507-0_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540662389","9783540485070"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-48507-0_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1999]]}}}