{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,23]],"date-time":"2025-01-23T05:32:59Z","timestamp":1737610379399,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540770893"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77090-9_3","type":"book-chapter","created":{"date-parts":[[2007,11,26]],"date-time":"2007-11-26T17:19:26Z","timestamp":1196097566000},"page":"22-30","source":"Crossref","is-referenced-by-count":0,"title":["The Case Study of Information Security System for International Airports"],"prefix":"10.1007","author":[{"given":"Hangbae","family":"Chang","sequence":"first","affiliation":[]},{"given":"Moonoh","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Hyuk-jun","family":"Kwon","sequence":"additional","affiliation":[]},{"given":"Byungwan","family":"Han","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"IIAC Newsletter, Issue 60 (May 2006)","key":"3_CR1"},{"doi-asserted-by":"crossref","unstructured":"Otwell, K., Aldridge, B.: The Role of Vulnerability in Risk Management. In: IEEE Proceedings of the 5th Annual Computer Security Applicant Conference, pp. 32\u201338 (1989)","key":"3_CR2","DOI":"10.1109\/CSAC.1989.81022"},{"doi-asserted-by":"crossref","unstructured":"Wagner, G.: Agent-Oriented Analysis and Design of Organizational Information Systems. In: Proc. of Fourth IEEE International Baltic Workshop on Databases and Information Systems, Vilnius (Lithuania) (May 2000)","key":"3_CR3","DOI":"10.1007\/978-94-015-9636-7_9"},{"issue":"3","key":"3_CR4","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1038\/scientificamerican0991-94","volume":"265","author":"Mark Weiser","year":"1991","unstructured":"Weiser, M.: The Computer for the 21st Century. Scientific American\u00a0265(3) (September 1991)","journal-title":"Scientific American"},{"unstructured":"Suematsu, Y., Takadama, K., Nawa, N., Shimohara, K., Katai, O.: Analyzing levels of the microapproach and its implications in the agent-based simulation. In: Proceedings of the 6th International Conference on Complex Systems, Chuo University, Tokyo, Japan, pp. 44\u201351 (September 2002)","key":"3_CR5"},{"unstructured":"Wagner, G.: The Agent-Object-Relationship metamodel: Towards a uni-fied conceptual view of state and behavior. Technical report, Eindhoven Univ. of Technology, Fac. of Technology Management, Information Systems (May 2002), http:\/\/AOR.rezearch.info","key":"3_CR6"},{"key":"3_CR7","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/3-540-44631-1_7","volume-title":"Intelligent Agents VII. Agent Theories Architectures and Languages","author":"F. Bellifemine","year":"2001","unstructured":"Bellifemine, F., Poggi, A., Rimassa, G.: Developing Multi-agent Systems with JADE. In: Castelfranchi, C., Lesp\u00e9rance, Y. (eds.) ATAL 2000. LNCS (LNAI), vol.\u00a01986, pp. 89\u2013103. Springer, Heidelberg (2001)"},{"issue":"3-4","key":"3_CR8","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1142\/S0218843002000571","volume":"11","author":"F. Bergenti","year":"2002","unstructured":"Bergenti, F., Poggi, A.: Ubiquitous Information Agents. International Journal of Cooperative Information Systems\u00a011(3-4), 231\u2013244 (2002)","journal-title":"International Journal of Cooperative Information Systems"},{"unstructured":"Ayesh, A., Bechkoum, K.: Framework of multi-agents internet security system. In: AI 2000. Appl Inform (2000)","key":"3_CR9"},{"key":"3_CR10","series-title":"Lecture Notes in Artificial Intelligence","volume-title":"Trust, Reputation, and Security: Theories and Practice","author":"K. Lalana","year":"2003","unstructured":"Lalana, K., Tim, F., Anupam, J.: Developing secure agent systems using delegation based trust management. In: Falcone, R., Barber, S., Korba, L., Singh, M.P. (eds.) AAMAS 2002. LNCS (LNAI), vol.\u00a02631, Springer, Heidelberg (2003)"}],"container-title":["Lecture Notes in Computer Science","Emerging Directions in Embedded and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77090-9_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T22:20:08Z","timestamp":1737584408000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77090-9_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540770893"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77090-9_3","relation":{},"subject":[]}}