{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:07:52Z","timestamp":1725491272097},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540743767"},{"type":"electronic","value":"9783540743774"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-74377-4_74","type":"book-chapter","created":{"date-parts":[[2007,9,12]],"date-time":"2007-09-12T05:38:34Z","timestamp":1189575514000},"page":"714-724","source":"Crossref","is-referenced-by-count":0,"title":["Software Agents Action Securities"],"prefix":"10.1007","author":[{"given":"Vojislav","family":"Stojkovic","sequence":"first","affiliation":[]},{"given":"Hongwei","family":"Huo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"74_CR1","volume-title":"Computer Security - Art and Science","author":"M. Bishop","year":"2003","unstructured":"Bishop, M.: Computer Security - Art and Science. Addison-Wesley, Boston,Massachusetts (2003)"},{"key":"74_CR2","volume-title":"Readings in Agents","author":"M.N. Huhns","year":"1997","unstructured":"Huhns, M.N., P., M.: Readings in Agents. Morgan Kaufmann Publishers Inc, San Francisco, California (1997)"},{"key":"74_CR3","volume-title":"Artificial Intelligence: A Modern Approach","author":"S. Russell","year":"1995","unstructured":"Russell, S., Norvig, P.: Artificial Intelligence: A Modern Approach. Prentice Hall, Englewood Cliffs, New Jersey (1995)"},{"key":"74_CR4","unstructured":"Stojkovic, V., Lupton, W.: Software Agents - A Contribution to Agents Specification. ISECON 2000, Information System Education, Philadelphia, Pennsylvania (2000)"},{"key":"74_CR5","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/3487.001.0001","volume-title":"Heterogeneous Agent Systems","author":"V.S. Subrahmanian","year":"2000","unstructured":"Subrahmanian, V.S., Bonatti, P., Dix, J., Eiter, T., Kraus, S., Ozcan, F., Ross, R.: Heterogeneous Agent Systems. MIT Press, Cambridge, Massachusetts (2000)"},{"key":"74_CR6","volume-title":"Building Secure Software - How to Avoid Security Problems the Right Way","author":"J. Viega","year":"2002","unstructured":"Viega, J., McGraw, G.: Building Secure Software - How to Avoid Security Problems the Right Way. Addison-Wesley, Boston, Massachusetts (2002)"},{"key":"74_CR7","volume-title":"Multiagent Systems: A Modern Approach to Distributed Artificial Intelligence","author":"G. Weiss","year":"1999","unstructured":"Weiss, G.: Multiagent Systems: A Modern Approach to Distributed Artificial Intelligence. The MIT Press, Cambridge, Massachusetts (1999)"}],"container-title":["Lecture Notes in Computer Science","Computational Intelligence and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74377-4_74.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:21:49Z","timestamp":1605763309000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74377-4_74"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540743767","9783540743774"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74377-4_74","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}