{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T21:39:27Z","timestamp":1725745167061},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642398650"},{"type":"electronic","value":"9783642398667"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-39866-7_4","type":"book-chapter","created":{"date-parts":[[2013,8,14]],"date-time":"2013-08-14T06:08:18Z","timestamp":1376460498000},"page":"56-72","source":"Crossref","is-referenced-by-count":0,"title":["MDA-Based Approach for Implementing Secure Mobile Agent Systems"],"prefix":"10.1007","author":[{"given":"Slim","family":"Kallel","sequence":"first","affiliation":[]},{"given":"Monia","family":"Loulou","sequence":"additional","affiliation":[]},{"given":"Molka","family":"Rekik","sequence":"additional","affiliation":[]},{"given":"Ahmed Hadj","family":"Kacem","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1007\/11611257_52","volume-title":"SOFSEM 2006: Theory and Practice of Computer Science","author":"S. Ugurlu","year":"2006","unstructured":"Ugurlu, S., Erdogan, N.: A Flexible Policy Architecture for Mobile Agents. In: Wiedermann, J., Tel, G., Pokorn\u00fd, J., Bielikov\u00e1, M., \u0160tuller, J. (eds.) SOFSEM 2006. LNCS, vol.\u00a03831, pp. 538\u2013547. Springer, Heidelberg (2006)"},{"key":"4_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/10722599_17","volume-title":"Computer Security - ESORICS 2000","author":"C.B. Bryce","year":"2000","unstructured":"Bryce, C.B.: A Security Framework for a Mobile Agent System. In: Cuppens, F., Deswarte, Y., Gollmann, D., Waidner, M. (eds.) ESORICS 2000. LNCS, vol.\u00a01895, pp. 273\u2013290. Springer, Heidelberg (2000)"},{"key":"4_CR3","unstructured":"Maria, B.A.D., da Silva, V.T., de Lucena, C.J.P.: Developing Multi-Agent Systems Based on MDA. In: Proceedings of the 17th Conference on Advanced Information Systems Engineering - CAiSE. CEUR Workshop Proceedings, vol.\u00a0161. CEUR-WS.org (2005)"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Loulou, M., Jmaiel, M., Mosbah, M.: Dynamic Security Framework for Mobile Agent Systems: Specification, Verification and Enforcement. International Journal of Information and Computer Security - IJICS, 321\u2013336 (2009)","DOI":"10.1504\/IJICS.2009.031043"},{"key":"4_CR5","unstructured":"Acceleo: Effective MDA (2007), \n                    \n                      http:\/\/www.acceleo.org\/"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Loulou, M., Kacem, A.H., Jmaiel, M., Mosbah, M.: A Formal Security Framework for Mobile Agent Systems: Specification and Verification. In: Proceedings of the 3rd International Conference on Risks and Security of Internet and Systems, pp. 69\u201376. IEEE (2008)","DOI":"10.1109\/CRISIS.2008.4757465"},{"key":"4_CR7","unstructured":"Woodcock, J., Davies, J.: Using Z: Specification Refinement and Proof. International Thomson Computer Press (1996)"},{"key":"4_CR8","unstructured":"Meisels, I., Saaltink, M.: The Z\/EVES Reference Manual (for Version 1.5). Technical report, ORA Canada (1997)"},{"key":"4_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1007\/978-3-642-30947-2_37","volume-title":"Agent and Multi-Agent Systems. Technologies and Applications","author":"M. Rekik","year":"2012","unstructured":"Rekik, M., Kallel, S., Loulou, M., Kacem, A.H.: Modeling Secure Mobile Agent Systems. In: Jezic, G., Kusek, M., Nguyen, N.-T., Howlett, R.J., Jain, L.C. (eds.) KES-AMSTA 2012. LNCS, vol.\u00a07327, pp. 330\u2013339. Springer, Heidelberg (2012)"},{"key":"4_CR10","unstructured":"IBM: Aglets (1996), \n                    \n                      http:\/\/www.trl.ibm.com\/aglets\/"},{"key":"4_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1007\/11663430_14","volume-title":"Satellite Events at the MoDELS 2005 Conference","author":"F. Jouault","year":"2006","unstructured":"Jouault, F., Kurtev, I.: Transforming Models with ATL. In: Bruel, J.-M. (ed.) MoDELS 2005 Workshops. LNCS, vol.\u00a03844, pp. 128\u2013138. Springer, Heidelberg (2006)"},{"key":"4_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/3-540-45337-7_18","volume-title":"ECOOP 2001 - Object-Oriented Programming","author":"G. Kiczales","year":"2001","unstructured":"Kiczales, G., Hilsdale, E., Hugunin, J., Kersten, M., Palm, J., Griswold, W.G.: An Overview of AspectJ. In: Lindskov Knudsen, J. (ed.) ECOOP 2001. LNCS, vol.\u00a02072, pp. 327\u2013353. Springer, Heidelberg (2001)"},{"key":"4_CR13","doi-asserted-by":"publisher","first-page":"832","DOI":"10.1016\/j.infsof.2008.05.003","volume":"51","author":"G. Beydoun","year":"2009","unstructured":"Beydoun, G., Low, G., Mouratidis, H., Henderson-Sellers, B.: A security-aware metamodel for multi-agent systems (MAS). Information and Software Technology\u00a051, 832\u2013845 (2009)","journal-title":"Information and Software Technology"},{"key":"4_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/11738817_8","volume-title":"Software Engineering for Multi-Agent Systems IV","author":"G. Beydoun","year":"2006","unstructured":"Beydoun, G., Gonzalez-Perez, C., Henderson-Sellers, B., Low, G.: Developing and Evaluating a Generic Metamodel for MAS Work Products. In: Garcia, A., Choren, R., Lucena, C., Giorgini, P., Holvoet, T., Romanovsky, A. (eds.) SELMAS 2005. LNCS, vol.\u00a03914, pp. 126\u2013142. Springer, Heidelberg (2006)"},{"key":"4_CR15","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1142\/S0218194007003240","volume":"17","author":"H. Mouratidis","year":"2007","unstructured":"Mouratidis, H., Giorgini, P.: Secure Tropos: a Security-Oriented Extension of the Tropos Methodology. International Journal of Software Engineering and Knowledge Engineering\u00a017, 285\u2013309 (2007)","journal-title":"International Journal of Software Engineering and Knowledge Engineering"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Nusrat, E., Ahmed, A.S., Rahman, G.M., Jamal, L.: SAGLET- Secure Agent Communication Model. In: Proceedings of 11th International Conference on Computer and Information Technology - ICCIT, pp. 371\u2013375. IEEE (2008)","DOI":"10.1109\/ICCITECHN.2008.4802965"}],"container-title":["Lecture Notes in Computer Science","Agent-Oriented Software Engineering XIII"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-39866-7_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T11:37:40Z","timestamp":1558006660000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-39866-7_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642398650","9783642398667"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-39866-7_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}