{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:55:39Z","timestamp":1725537339293},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642044335"},{"type":"electronic","value":"9783642044342"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04434-2_5","type":"book-chapter","created":{"date-parts":[[2009,9,14]],"date-time":"2009-09-14T18:06:27Z","timestamp":1252951587000},"page":"46-57","source":"Crossref","is-referenced-by-count":7,"title":["An Autonomous Attestation Token to Secure Mobile Agents in Disaster Response"],"prefix":"10.1007","author":[{"given":"Daniel M.","family":"Hein","sequence":"first","affiliation":[]},{"given":"Ronald","family":"Toegl","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1145\/860575.860645","volume-title":"AAMAS 2003: Proceedings of the second international joint conference on Autonomous agents and multiagent systems","author":"P. Scerri","year":"2003","unstructured":"Scerri, P., Pynadath, D., Johnson, L., Rosenbloom, P., Si, M., Schurr, N., Tambe, M.: A prototype infrastructure for distributed robot-agent-person teams. In: AAMAS 2003: Proceedings of the second international joint conference on Autonomous agents and multiagent systems, pp. 433\u2013440. ACM, New York (2003)"},{"key":"5_CR2","unstructured":"Schurr, N., Marecki, J., Tambe, M.: The future of disaster response: Humans working with multiagent teams using DEFACTO. In: AAAI Spring Symposium on AI Technologies for Homeland Security (2005)"},{"key":"5_CR3","first-page":"155","volume-title":"Proceedings of the 1st International Workshop","author":"K. Rothermel","year":"1997","unstructured":"Rothermel, K., Schwehm, M.: Mobile agents. In: Proceedings of the 1st International Workshop, pp. 155\u2013176. Springer, Heidelberg (1997)"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Jansen, W., Karygiannis, T.: NIST special publication 800-19 - mobile agent security (2000)","DOI":"10.6028\/NIST.SP.800-19"},{"key":"5_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/3-540-68671-1_5","volume-title":"Mobile Agents and Security","author":"G.C. Necula","year":"1998","unstructured":"Necula, G.C., Lee, P.: Untrusted agents using proof-carrying code. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol.\u00a01419, pp. 61\u201391. Springer, Heidelberg (1998)"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Balfe, S., Gallery, E.: Mobile agents and the deus ex machina. In: 21st International Conference Advanced Information Networking and Applications Workshops (AINAW 2007), May 2007, vol.\u00a02, pp. 486\u2013492 (2007)","DOI":"10.1109\/AINAW.2007.252"},{"key":"5_CR7","unstructured":"Trusted Computing Group: TCG TPM specification version 1.2 revision 103 (2007), https:\/\/www.trustedcomputinggroup.org\/specs\/TPM\/"},{"key":"5_CR8","unstructured":"Trusted Computing Group: TCG mobile trusted module specification version 1.0 revision 6 (June 2008), https:\/\/www.trustedcomputinggroup.org\/specs\/mobilephone\/"},{"key":"5_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-88625-9_1","volume-title":"Information and Communications Security","author":"G. Coker","year":"2008","unstructured":"Coker, G., Guttman, J.D., Loscocco, P., Sheehy, J., Sniffen, B.T.: Attestation: Evidence and trust. In: Chen, L., Ryan, M.D., Wang, G. (eds.) ICICS 2008. LNCS, vol.\u00a05308, pp. 1\u201318. Springer, Heidelberg (2008)"},{"key":"5_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-10868-6","volume-title":"TRUST 2009","author":"M. Pirker","year":"2009","unstructured":"Pirker, M., Toegl, R., Hein, D., Danner, P.: A PrivacyCA for anonymity and trust. In: TRUST 2009. LNCS, vol.\u00a05471. Springer, Heidelberg (2009)"},{"issue":"7","key":"5_CR11","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/35.689628","volume":"36","author":"V.A. Pham","year":"1998","unstructured":"Pham, V.A., Karmouch, A.: Mobile software agents: an overview. IEEE Communications Magazine\u00a036(7), 26\u201337 (1998)","journal-title":"IEEE Communications Magazine"},{"key":"5_CR12","unstructured":"Parno, B.: Bootstrapping trust in a \u201ctrusted\u201d platform. In: HOTSEC 2008: Proceedings of the 3rd conference on Hot topics in security, Berkeley, CA, USA, USENIX Association, pp. 1\u20136 (2008)"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"McCune, J.M., Perrig, A., Seshadri, A., van Doorn, L.: Turtles all the way down: Research challenges in user-based attestation. In: Proceedings of the Workshop on Hot Topics in Security (HotSec) (August 2007)","DOI":"10.1145\/1413901.1413903"},{"key":"5_CR14","unstructured":"Farmer, W., Guttman, J., Swarup, V.: Security for mobile agents: Issues and requirements. In: National Information Systems Security Conference, NISSC 1996 (1996)"},{"issue":"2","key":"5_CR15","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1109\/JPROC.2005.862423","volume":"94","author":"R. Anderson","year":"2006","unstructured":"Anderson, R., Bond, M., Clulow, J., Skorobogatov, S.: Cryptographic processors-a survey. Proceedings of the IEEE\u00a094(2), 357\u2013369 (2006)","journal-title":"Proceedings of the IEEE"},{"key":"5_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/3-540-48749-2_22","volume-title":"Secure Internet Programming","author":"U. Wilhelm","year":"1999","unstructured":"Wilhelm, U., Staamann, S., Buttyan, L.: Introducing trusted third parties to the mobile agent paradigm. In: Vitek, J., Jensen, C. (eds.) Secure Internet Programming. LNCS, vol.\u00a01603, pp. 471\u2013491. Springer, Heidelberg (1999)"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Wu, X., Shen, Z., Zhang, H.: The mobile agent security enhanced by trusted computing technology. In: International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM 2006), September 2006, pp. 1\u20134 (2006)","DOI":"10.1109\/WiCOM.2006.305"},{"key":"5_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-3-540-73131-3_6","volume-title":"Software Engineering for Multi-Agent Systems V","author":"A. Pridgen","year":"2007","unstructured":"Pridgen, A., Julien, C.: SMASH: Modular security for mobile agents. In: Choren, R., Garcia, A., Giese, H., Leung, H.-f., Lucena, C., Romanovsky, A. (eds.) SELMAS. LNCS, vol.\u00a04408, pp. 99\u2013116. Springer, Heidelberg (2007)"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Dietrich, K., Winter, J.: Secure boot revisited. In: TrustCom 2008 Proceedings, in ICYCS Proceedings, pp. 2360\u20132365 (2008)","DOI":"10.1109\/ICYCS.2008.535"},{"key":"5_CR20","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"2001","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (2001)"},{"key":"5_CR21","unstructured":"Stumpf, F., Tafreschi, O., R\u00f6der, P., Eckert, C.: A robust integrity reporting protocol for remote attestation. In: Proceedings of the Second Workshop on Advances in Trusted Computing, WATC 2006 (Fall 2006)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Mobile Information and Communication Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04434-2_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T15:21:00Z","timestamp":1558538460000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04434-2_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044335","9783642044342"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04434-2_5","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2009]]}}}