{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T09:53:44Z","timestamp":1725530024099},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642009716"},{"type":"electronic","value":"9783642009723"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00972-3_14","type":"book-chapter","created":{"date-parts":[[2009,4,6]],"date-time":"2009-04-06T21:33:26Z","timestamp":1239053606000},"page":"168-181","source":"Crossref","is-referenced-by-count":0,"title":["A Secure Code Deployment Scheme for Active Networks"],"prefix":"10.1007","author":[{"given":"Le\u00efla","family":"Kloul","sequence":"first","affiliation":[]},{"given":"Amdjed","family":"Mokhtari","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Alexander, D., Arbaugh, W., Keromytis, A., Smith, J.: Safety and security of programmable network infrastructures (1998)","DOI":"10.1109\/35.722141"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Alexander, D.S., Arbaugh, W.A., Hicks, M., Kakkar, P., Keromytis, A.D., Moore, J.T., Gunter, C.A., Nettles, S., Smith, J.M.: The switchware active network architecture. Departement of Computer and Information Science University of Pennsylvania (Juillet 1998)","DOI":"10.1109\/65.690959"},{"key":"14_CR3","unstructured":"Bouzeghoub, M., Kloul, L., Mokhtari, A.: A new active network framework based on active rules. Technical Recherche\u00a021, PRiSM (2002)"},{"key":"14_CR4","volume-title":"Proceedings of DARPA Active Networks Conference and Exposition (DANCE 2002)","author":"R. Braden","year":"2002","unstructured":"Braden, R., Lindell, B., Berson, S., Faber, T.: The asp ee: An active network execution environment. In: Proceedings of DARPA Active Networks Conference and Exposition (DANCE 2002). IEEE CS Press, Los Alamitos (2002)"},{"key":"14_CR5","unstructured":"Calvert, K.: Architectural framework for active networks. Technical repport, AN Architecture Working Group (Juillet 1998)"},{"key":"14_CR6","unstructured":"Decasper, D., Plattner, B.: Dan - distributed code caching for active networks. In: IEEE INFOCOM, San Francisco (April 1998)"},{"key":"14_CR7","unstructured":"AN\u00a0Security\u00a0Working Group. Security architecture for active nets (2001)"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Hicks, M., Kakkar, P., Moore, J.T., Gunter, C.A., Nettles, S.: Plan: A packet language for active networks. Departement of Computer and Information Science University of Pennsylvania (Juillet 1998)","DOI":"10.1145\/289423.289431"},{"issue":"2-4","key":"14_CR9","doi-asserted-by":"publisher","first-page":"438","DOI":"10.1023\/B:TELS.0000041018.31172.ef","volume":"27","author":"J. Hillston","year":"2004","unstructured":"Hillston, J., Kloul, L., Mokhtari, A.: Towards a feasible active networking scenario. Telecommunication Systems\u00a027(2-4), 413, 438 (2004)","journal-title":"Telecommunication Systems"},{"key":"14_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/3-540-45859-X_32","volume-title":"From QoS Provisioning to QoS Charging","author":"M. Calderon","year":"2002","unstructured":"Calderon, M., Bagnulo, M., Alarcos, B., Sedano, M.: Providing Authentication & Authorization Mechanisms for Active Service Charging. In: Stiller, B., Smirnow, M., Karsten, M., Reichl, P. (eds.) QofIS 2002 and ICQT 2002. LNCS, vol.\u00a02511, pp. 337\u2013346. Springer, Heidelberg (2002)"},{"key":"14_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/3-540-36199-5_6","volume-title":"Active Networks","author":"H. Otsuki","year":"2002","unstructured":"Otsuki, H., Bossardt, M., Egawa, T., Plattner, B.: Integrated service deployment for active networks. In: Sterbenz, J.P.G., Takada, O., Tschudin, C.F., Plattner, B. (eds.) IWAN 2002. LNCS, vol.\u00a02546, pp. 74\u201386. Springer, Heidelberg (2002)"},{"key":"14_CR12","unstructured":"Murphy, S., Lewis, E., Puga, R., Watson, R., Yee, R.: Strong security for active networks (2001)"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Necula, G.C., Lee, P.: Research on proof-carrying code for untrusted-code security. In: Proceedings of the IEEE Symposium on Security and Privacy, Oakland (1997)","DOI":"10.1109\/SECPRI.1997.601335"},{"issue":"1","key":"14_CR14","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/S1389-1286(01)00154-2","volume":"36","author":"I. Wakeman","year":"2001","unstructured":"Wakeman, I., Jeffrey, A., Owen, T., Pepper, D.: Safetynet: A language-based approach to programmable networks. Computer Networks\u00a036(1), 101\u2013114 (2001)","journal-title":"Computer Networks"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Wetherall, D.J.: Active network vision and reality: lessons from a capsule-based system. In: Operating Systems Review, 17th ACM Symposium on Operating Systems Principles (SOPS 1999), December 1999, vol.\u00a0(34), pp. 64\u201379 (1999)","DOI":"10.1145\/319151.319156"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Wetherall, D., et al.: Ants: A toolkit for building and dynamically deploying network protocols. In: IEEE OPENARCH, San Francisco (April 1998)","DOI":"10.1109\/OPNARC.1998.662048"},{"issue":"3","key":"14_CR17","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1016\/S0140-3664(03)00237-8","volume":"27","author":"Y. Zhou","year":"2004","unstructured":"Zhou, Y., Zhang, Y., Lu, J.: Cds: a code distribution scheme for active networks. Computer Communications\u00a027(3), 315, 321(7) (2004)","journal-title":"Computer Communications"}],"container-title":["Lecture Notes in Computer Science","Active and Programmable Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00972-3_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T06:09:55Z","timestamp":1558246195000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00972-3_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642009716","9783642009723"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00972-3_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}