{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T21:51:33Z","timestamp":1725745893884},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642407758"},{"type":"electronic","value":"9783642407765"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40776-5_6","type":"book-chapter","created":{"date-parts":[[2013,8,19]],"date-time":"2013-08-19T05:14:10Z","timestamp":1376889250000},"page":"29-43","source":"Crossref","is-referenced-by-count":2,"title":["A Practical Security Infrastructure for Distributed Agent Applications"],"prefix":"10.1007","author":[{"given":"Lars","family":"Braubach","sequence":"first","affiliation":[]},{"given":"Kai","family":"Jander","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Pokahr","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"Biskup, J., Kern-Isberner, G., Thimm, M.: Towards enforcement of confidentiality in agent interactions. In: Proceedings of the 12th International Workshop on Non-Monotonic Reasoning (NMR 2008), University of New South Wales, Technical Report No. UNSW-CSE-TR-0819, pp. 104\u2013112 (September 2008)"},{"issue":"2","key":"6_CR2","first-page":"3","volume":"13","author":"L. Braubach","year":"2012","unstructured":"Braubach, L., Pokahr, A.: Developing Distributed Systems with Active Components and Jadex. Scalable Computing: Practice and Experience\u00a013(2), 3\u201324 (2012)","journal-title":"Scalable Computing: Practice and Experience"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.2. Internet Engineering Task Force (August 2008)","DOI":"10.17487\/rfc5246"},{"key":"6_CR4","unstructured":"Goichon, F., Salagnac, G., Fr\u00e9not, S.: Exploiting Java Code Interactions. Technical Report RT-0419, INRIA (December 2011)"},{"key":"6_CR5","volume-title":"The Java Language Specification","author":"J. Gosling","year":"2012","unstructured":"Gosling, J., Joy, B., Steele, G., Bracha, G., Buckley, A.: The Java Language Specification, 7th edn. Addison-Wesley Professional, California (2012)","edition":"7"},{"key":"6_CR6","first-page":"10","volume-title":"HICSS","author":"H. Lee","year":"2004","unstructured":"Lee, H., Alves-Foss, J., Harrison, S.: The use of encrypted functions for mobile agent security. In: HICSS, pages 10. IEEE, New York (2004)"},{"key":"6_CR7","unstructured":"Moffett, J.D.: Distributed Systems Security. A. Kent, J.G. Williams\u00a015 (1995)"},{"key":"6_CR8","series-title":"AISC","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/978-3-642-31513-8_3","volume-title":"Advances in Computing and Information Technology","author":"S.V. Nagaraj","year":"2012","unstructured":"Nagaraj, S.V.: Securing multi-agent systems: A survey. In: Meghanathan, N., Nagamalai, D., Chaki, N. (eds.) Advances in Computing & Inform. Technology. AISC, vol.\u00a0176, pp. 23\u201330. Springer, Heidelberg (2012)"},{"issue":"9","key":"6_CR9","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/35.312841","volume":"32","author":"B.C. Neuman","year":"1994","unstructured":"Neuman, B.C., Ts\u2019o, T.: Kerberos: An authentication service for computer networks. Comm. Mag.\u00a032(9), 33\u201338 (1994)","journal-title":"Comm. Mag."},{"key":"6_CR10","unstructured":"NIST. Advanced Encryption Standard (AES) (FIPS PUB 197). National Institute of Standards and Technology (November 2001)"},{"key":"6_CR11","unstructured":"NIST. Underlying Technical Models for Information Technology Security. National Institute of Standards and Technology (Decmeber 2001)"},{"issue":"6","key":"6_CR12","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1145\/1620693.1620708","volume":"16","author":"D.A. Norman","year":"2009","unstructured":"Norman, D.A.: The way i see it: When security gets in the way. Interactions\u00a016(6), 60\u201363 (2009)","journal-title":"Interactions"},{"key":"6_CR13","unstructured":"OASIS. Web Services Security: SOAP Message Security 1.1 (February 2006)"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Oey, M., Warnier, M., Brazier, F.: Security in Large-Scale Open Distributed Multi- Agent Systems. In: Autonomous Agents, Rijeka, Croatia, pp. 1\u201327. IN-TECH (2010)","DOI":"10.5772\/9656"},{"issue":"4","key":"6_CR15","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1080\/17445760.2013.785546","volume":"28","author":"A. Pokahr","year":"2013","unstructured":"Pokahr, A., Braubach, L.: The active components approach for distributed systems development. International Journal of Parallel, Emergent and Distributed Systems\u00a028(4), 321\u2013369 (2013)","journal-title":"International Journal of Parallel, Emergent and Distributed Systems"},{"key":"6_CR16","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM\u00a021, 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"issue":"5","key":"6_CR17","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1016\/j.cose.2006.12.003","volume":"26","author":"X. Vila","year":"2007","unstructured":"Vila, X., Schuster, A., Riera, A.: Security for a Multi-Agent System based on JADE. Computers & Security\u00a026(5), 391\u2013400 (2007)","journal-title":"Computers & Security"}],"container-title":["Lecture Notes in Computer Science","Multiagent System Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40776-5_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T18:31:10Z","timestamp":1558031470000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40776-5_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642407758","9783642407765"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40776-5_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}