{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T10:53:07Z","timestamp":1725533587726},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642026164"},{"type":"electronic","value":"9783642026171"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02617-1_23","type":"book-chapter","created":{"date-parts":[[2009,6,17]],"date-time":"2009-06-17T14:22:04Z","timestamp":1245248524000},"page":"223-228","source":"Crossref","is-referenced-by-count":1,"title":["On the Security Properties and Attacks against Mobile Agent Graph Head Sealing (MAGHS)"],"prefix":"10.1007","author":[{"given":"Abid","family":"Khan","sequence":"first","affiliation":[]},{"given":"Qasim","family":"Arshad","sequence":"additional","affiliation":[]},{"given":"Xiamu","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Zhang","family":"Yong","sequence":"additional","affiliation":[]},{"given":"Muhammad Waqas","family":"Anwar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1007\/1-4020-5634-6_34","volume-title":"Technologies for Business Information Systems","author":"C. Ma","year":"2007","unstructured":"Ma, C., Concepcion, A.: A security evaluation model for multi-agent distributed systems. In: Technologies for Business Information Systems, pp. 403\u2013415. Springer, Heidelberg (2007)"},{"key":"23_CR2","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1166\/juci.2007.008","volume":"1","author":"J.P. Tsai","year":"2007","unstructured":"Tsai, J.P., Ma, L.: Security modeling of mobile agent systems. Journal of Ubiquitous Computing and Intelligence\u00a01, 73\u201385 (2007)","journal-title":"Journal of Ubiquitous Computing and Intelligence"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Kannammal, A., Ramachandran, V., et al.: Reliable multiagent system for e-business applications. Academic Open Internet Journal\u00a018 (2006)","DOI":"10.1109\/AICCSA.2006.205109"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Jonsson, E., Olovsson, T.: A quantitative model of the security intrusion process based on attacker behavior. IEEE Transactions on Software Engineering\u00a023(4) (1997)","DOI":"10.1109\/32.588541"},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Pleisch, S., Schiper, A.: Fault tolerant mobile agent execution. IEEE Transaction on Computers\u00a052(2) (2003)","DOI":"10.1109\/TC.2003.1176987"},{"key":"23_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/3-540-49255-0_77","volume-title":"Object-Oriented Technology. ECOOP \u201998 Workshop Reader","author":"F. Hohl","year":"1998","unstructured":"Hohl, F.: A model of attacks of malicious host against mobile agents. In: Demeyer, S., Bosch, J. (eds.) ECOOP 1998 Workshops. LNCS, vol.\u00a01543, p. 299. Springer, Heidelberg (1998)"},{"key":"23_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/3-540-46674-6_31","volume-title":"Advances in Computing Science - ASIAN\u201999","author":"A.H.W. Chan","year":"1999","unstructured":"Chan, A.H.W., Lyu, M.R.: Security modeling and evaluation for mobile code paradigm. In: Thiagarajan, P.S., Yap, R.H.C. (eds.) ASIAN 1999. LNCS, vol.\u00a01742, pp. 371\u2013372. Springer, Heidelberg (1999)"},{"key":"23_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/BFb0057659","volume-title":"Mobile Agents","author":"G. Karjoth","year":"1998","unstructured":"Karjoth, G., Asokan, N., et al.: Protecting the computation results of free-roaming agents. In: Rothermel, K., Hohl, F. (eds.) MA 1998. LNCS, vol.\u00a01477, p. 195. Springer, Heidelberg (1998)"},{"key":"23_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/3-540-48749-2_12","volume-title":"Secure Internet Programming","author":"B. Yee","year":"1999","unstructured":"Yee, B.: A sanctuary for mobile agents. In: Vitek, J. (ed.) Secure Internet Programming. LNCS, vol.\u00a01603, pp. 261\u2013273. Springer, Heidelberg (1999)"},{"issue":"1","key":"23_CR10","first-page":"13","volume":"2","author":"A. Khan","year":"2008","unstructured":"Khan, A., Niu, X., et al.: Mobile agent computation results protection with head sealing. IJCSES\u00a02(1), 13\u201318 (2008)","journal-title":"IJCSES"},{"key":"23_CR11","unstructured":"Loureiro, S.: Mobile code protection. Ph.D thesis, ENST Paris \/ Institut Eurecom (2001)"},{"key":"23_CR12","unstructured":"Lin, H.-C., et al.: Protection of mobile agent data collection by using ring signature. In: Proceedings IEEE International Conference on Networking, Sensing & Control (2004)"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"McDonald, J.T., Yasinsac, A., et al.: Mobile agent data Integrity using multi-agent architecture. In: Proceedings of the (PDCS 2004), pp. 14\u201317 (2004)","DOI":"10.21236\/ADA425102"},{"key":"23_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/3-540-48749-2_13","volume-title":"Secure Internet programming: Security Issues for Mobile and Distributed Objects","author":"V. Roth","year":"1999","unstructured":"Roth, V.: Mutual protection of co-operating agents. In: Vitek, J. (ed.) Secure Internet Programming. LNCS, vol.\u00a01603, pp. 275\u2013285. Springer, Heidelberg (1999)"},{"key":"23_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/3-540-68671-1_8","volume-title":"Mobile Agents and Security","author":"J. Vigna","year":"1998","unstructured":"Vigna, J.: Cryptographic traces for mobile agents. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol.\u00a01419, pp. 137\u2013153. Springer, Heidelberg (1998)"},{"key":"23_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"927","DOI":"10.1007\/978-3-540-45227-0_90","volume-title":"Database and Expert Systems Applications","author":"O. Esparza","year":"2003","unstructured":"Esparza, O., et al.: Mobile agent watermarking and fingerprinting: tracing malicious hosts. In: Ma\u0159\u00edk, V., \u0160t\u011bp\u00e1nkov\u00e1, O., Retschitzegger, W. (eds.) DEXA 2003. LNCS, vol.\u00a02736, pp. 927\u2013936. Springer, Heidelberg (2003)"},{"key":"23_CR17","unstructured":"Lange, D.B., Oshima, M.: Programming and deploying Java mobile agents with Aglets. Addison Wiley (1998)"},{"key":"23_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1007\/3-540-68671-1_11","volume-title":"Mobile Agents and Security","author":"L. Gong","year":"1998","unstructured":"Gong, L., Schemers, R.: Signing, Sealing, and Guarding Java Objects. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol.\u00a01419, p. 206. Springer, Heidelberg (1998)"},{"key":"23_CR19","unstructured":"Oppliger, R.: Contemporary Cryptography. Artech House Computer Security (2005)"},{"issue":"1","key":"23_CR20","first-page":"48","volume":"1","author":"A. Khan","year":"2007","unstructured":"Khan, A., Niu, X., Yong, Z.: A hybrid approach for mobile agent security using reversible watermarking and dynamic data structure. IJCSES\u00a01(1), 48\u201353 (2007)","journal-title":"IJCSES"},{"key":"23_CR21","volume-title":"IEEE Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing","author":"A. Khan","year":"2007","unstructured":"Khan, A., Niu, X., Yong, Z.: Protecting mobile agent computation results with reversible watermarking and digital signature. In: IEEE Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE Computer Security, Los Alamitos (2007)"}],"container-title":["Lecture Notes in Computer Science","Advances in Information Security and Assurance"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02617-1_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T23:35:38Z","timestamp":1558395338000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02617-1_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642026164","9783642026171"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02617-1_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}