{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T14:17:05Z","timestamp":1725891425316},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642309465"},{"type":"electronic","value":"9783642309472"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30947-2_37","type":"book-chapter","created":{"date-parts":[[2012,6,18]],"date-time":"2012-06-18T09:16:30Z","timestamp":1340010990000},"page":"330-339","source":"Crossref","is-referenced-by-count":4,"title":["Modeling Secure Mobile Agent Systems"],"prefix":"10.1007","author":[{"given":"Molka","family":"Rekik","sequence":"first","affiliation":[]},{"given":"Slim","family":"Kallel","sequence":"additional","affiliation":[]},{"given":"Monia","family":"Loulou","sequence":"additional","affiliation":[]},{"given":"Ahmed Hadj","family":"Kacem","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"37_CR1","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1007\/978-3-540-75254-7_26","volume-title":"Multi-Agent Systems and Applications V","author":"T. Jarraya","year":"2007","unstructured":"Jarraya, T., Guessoum, Z.: Towards a Model Driven Process for Multi-Agent System. In: Burkhard, H.-D., Lindemann, G., Verbrugge, R., Varga, L.Z. (eds.) CEEMAS 2007. LNCS (LNAI), vol.\u00a04696, pp. 256\u2013265. Springer, Heidelberg (2007)"},{"key":"37_CR2","doi-asserted-by":"crossref","unstructured":"Fink, T., Koch, M., Pauls, K.: An MDA approach to Access Control Specifications Using MOF and UML Profiles. In: Proc. of the 1st VODCA, pp. 161\u2013179 (2004)","DOI":"10.1016\/j.entcs.2004.12.045"},{"key":"37_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/10722599_17","volume-title":"Computer Security - ESORICS 2000","author":"C.B. Bryce","year":"2000","unstructured":"Bryce, C.B.: A Security Framework for a Mobile Agent System. In: Cuppens, F., Deswarte, Y., Gollmann, D., Waidner, M. (eds.) ESORICS 2000. LNCS, vol.\u00a01895, pp. 273\u2013290. Springer, Heidelberg (2000)"},{"key":"37_CR4","doi-asserted-by":"crossref","unstructured":"Loulou, M., Jmaiel, M., Mosbah, M.: Dynamic Security Framework for Mobile Agent Systems: specification, verification and enforcement. IJICS, 321\u2013336 (2009)","DOI":"10.1504\/IJICS.2009.031043"},{"key":"37_CR5","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/1125808.1125810","volume":"15","author":"D. Basin","year":"2006","unstructured":"Basin, D., Doser, J., Lodderstedt, T.: Model Driven Security: From UML Models to Access Control Infrastructures. ACM TOSEM\u00a015, 39\u201391 (2006)","journal-title":"ACM TOSEM"},{"key":"37_CR6","unstructured":"IBM: Aglets (1996), \n                    \n                      http:\/\/www.trl.ibm.com\/aglets\/"},{"key":"37_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1007\/11663430_14","volume-title":"Satellite Events at the MoDELS 2005 Conference","author":"F. Jouault","year":"2006","unstructured":"Jouault, F., Kurtev, I.: Transforming Models with ATL. In: Bruel, J.-M. (ed.) MoDELS 2005. LNCS, vol.\u00a03844, pp. 128\u2013138. Springer, Heidelberg (2006)"},{"key":"37_CR8","doi-asserted-by":"crossref","unstructured":"Nusrat, E., Ahmed, A.S., Rahman, G.M., Jamal, L.: SAGLET- Secure Agent Communication Model. In: Proc. of 11th ICCIT 2008, pp. 371\u2013375. IEEE (2008)","DOI":"10.1109\/ICCITECHN.2008.4802965"},{"key":"37_CR9","unstructured":"Jean, E., Jiao, Y., Hurson, A.R., Potok, T.E.: SAS: A Secure Aglet Server. In: Proc. of Computer Security Conference (2007)"},{"key":"37_CR10","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/s10270-010-0162-z","volume":"11","author":"S. Kallel","year":"2012","unstructured":"Kallel, S., Kacem, M.H., Jmaiel, M.: Modeling and enforcing invariants of dynamic software architectures. Software and System Modeling\u00a011, 127\u2013149 (2012)","journal-title":"Software and System Modeling"}],"container-title":["Lecture Notes in Computer Science","Agent and Multi-Agent Systems. Technologies and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30947-2_37.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:34:12Z","timestamp":1620128052000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30947-2_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642309465","9783642309472"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30947-2_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}