{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T09:40:28Z","timestamp":1704793228511},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2008,4,6]],"date-time":"2008-04-06T00:00:00Z","timestamp":1207440000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Auton Agent Multi-Agent Syst"],"published-print":{"date-parts":[[2009,4]]},"DOI":"10.1007\/s10458-008-9043-z","type":"journal-article","created":{"date-parts":[[2008,4,5]],"date-time":"2008-04-05T10:01:05Z","timestamp":1207389665000},"page":"295-311","source":"Crossref","is-referenced-by-count":16,"title":["Evaluating the security of mobile agent platforms"],"prefix":"10.1007","volume":"18","author":[{"given":"Axel","family":"B\u00fcrkle","sequence":"first","affiliation":[]},{"given":"Alice","family":"Hertel","sequence":"additional","affiliation":[]},{"given":"Wilmuth","family":"M\u00fcller","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Wieser","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,4,6]]},"reference":[{"issue":"5","key":"9043_CR1","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1049\/ecej:20020504","volume":"14","author":"N. Borselius","year":"2002","unstructured":"Borselius N. (2002) Mobile agent security. Electronics & Communication Engineering Journal, 14(5): 211\u2013218","journal-title":"Electronics & Communication Engineering Journal,"},{"key":"9043_CR2","doi-asserted-by":"crossref","unstructured":"Karmouch, A., Magedanz, T., & Delgado, J. (Eds.) (2002). In Proceedings of the 4th International Workshop on Mobile Agents for Telecommunication Applications. Volume 2521 of LNCS, Springer.","DOI":"10.1007\/3-540-36086-7"},{"key":"9043_CR3","doi-asserted-by":"crossref","unstructured":"Yang, K., Galis, A., Guo, X., & Liu, D. (2003). Rule-driven mobile intelligent agents for real-time configuration of IP networks. In Knowledge-Based Intelligent Information and Engineering Systems: 7th International Conference, KES 2003 (pp. 921 \u2013 928). LNCS, Vol. 2773. Springer: Oxford, UK.","DOI":"10.1007\/978-3-540-45224-9_123"},{"key":"9043_CR4","unstructured":"Fok, C., Roman, G., & Lu, C. (2005). Mobile agent middleware for sensor networks: An application case study. In Proceedings of 4th Internatoinal Symposium on Information Processing in Sensor Networks, IEEE CNF 2005, pp. 382\u2013387."},{"key":"9043_CR5","volume-title":"Intelligent information agents","author":"B. Brewington","year":"1999","unstructured":"Brewington B., Gray R., Moizumi K., Kotz D., Cybenko G., Rus D. (1999) Mobile agents in distributed information retrieval. In: Klusch M.(eds) Intelligent information agents. Springer-Verlag, Heidelberg, Germany"},{"key":"9043_CR6","first-page":"119","volume-title":"Mobile agents, Proceedings of the 5th International Conference (MA 2001) LNCS, Vol. 2240","author":"P. Thati","year":"2001","unstructured":"Thati P., Chang P., Agha G. (2001) Crawlets: Agents for high performance web search engine. In: Picco G.P.(eds) Mobile agents, Proceedings of the 5th International Conference (MA 2001) LNCS, Vol. 2240. Springer, Atlanta USA, pp 119\u2013134"},{"key":"9043_CR7","unstructured":"Geirland, J. (2002). The feature: mobile intelligent agents. http:\/\/www.thefeature.com\/article?articleid=26051 ."},{"key":"9043_CR8","unstructured":"Beizer, B. (1990). Software testing techniques. International Thomson Computer Press."},{"key":"9043_CR9","unstructured":"JADE. (2007). http:\/\/jade.tilab.com ."},{"key":"9043_CR10","unstructured":"SeMoA. (2007). http:\/\/www.semoa.org ."},{"key":"9043_CR11","unstructured":"Gray, R., Kotz, D., Cybenko, G., & Rus, D. (1999). D\u2019Agents: Security in a multiple-language, mobile-agent system. In G. Vigna (Ed.), Mobile agents and security (pp. 154\u2013187) LNCS. Springer."},{"key":"9043_CR12","doi-asserted-by":"crossref","unstructured":"Jansen, W., & Karygiannis, T. (1999). Mobile agent security. Special Publication 800-19, NIST.","DOI":"10.6028\/NIST.SP.800-19"},{"key":"9043_CR13","doi-asserted-by":"crossref","unstructured":"Roth, V. (2002). Programming Satan\u2019s agents. In K. Fischer & D. Hutter (Eds.), Proceedings of the 1st International Workshop on Secure Mobile Multi-Agent Systems, SEMAS 2001. Elsevier.","DOI":"10.1016\/S1571-0661(04)80341-4"},{"key":"9043_CR14","doi-asserted-by":"crossref","unstructured":"Binder, W., & Roth, V. (2002). Secure mobile agent systems using java: where are we heading? In Proceedings of the 2002 ACM Symposium on Applied Computing, pp. 115\u2013119.","DOI":"10.1145\/508791.508813"},{"key":"9043_CR15","doi-asserted-by":"crossref","unstructured":"Hohl, F. (1998). Time limited blackbox security: protecting mobile agents from malicious hosts. In Mobile agents and security (pp. 92\u2013113). LNCS, Vol. 1419. Springer.","DOI":"10.1007\/3-540-68671-1_6"},{"key":"9043_CR16","doi-asserted-by":"crossref","unstructured":"Jansen, W. (2002). A privilege management scheme for mobile agent systems. In Electronic Notes in Theoretical Computer Science, SEMAS 2001, 1st International Workshop on Security of Mobile Multiagent Systems, Vol. 63.","DOI":"10.1016\/S1571-0661(04)80339-6"},{"key":"9043_CR17","doi-asserted-by":"crossref","unstructured":"Tschudin, C. (1999). Mobile agent security. In M. Klusch (Ed.), Intelligent information agents: Agent based information discovery and management in the Internet, Chapter 18. Springer.","DOI":"10.1007\/978-3-642-60018-0_22"},{"key":"9043_CR18","unstructured":"Vigna, G. (1997). Protecting mobile agents through tracing. In Proceedings of the 3rd ECOOP Workshop on Mobile Object Systems, Jyvalskyla, Finland."},{"issue":"17","key":"9043_CR19","doi-asserted-by":"crossref","first-page":"1667","DOI":"10.1016\/S0140-3664(00)00253-X","volume":"23","author":"W.A. Jansen","year":"2000","unstructured":"Jansen W.A. (2000) Countermeasures for mobile agent security. Computer Communications, 23(17): 1667\u20131676","journal-title":"Computer Communications,"},{"key":"9043_CR20","unstructured":"Burbeck, K., Garpe, D., & Nadjm-Tehrani, S. (2004). Scale-up and performance studies of three agent platforms. In Proceedings of the IEEE International Conference on Performance, Computing, and Communications, pp. 857\u2013863."},{"issue":"2","key":"9043_CR21","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1155\/2005\/973963","volume":"13","author":"K. Chmiel","year":"2005","unstructured":"Chmiel K., Gawinecki M., Kaczmarek P., Szymczak M., Paprzycki M. (2005) Efficiency of JADE agent platform. Scientific Programming, 13(2): 159\u2013172","journal-title":"Scientific Programming,"},{"key":"9043_CR22","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/3-540-45647-3_3","volume":"2240","author":"S. Fischmeister","year":"2001","unstructured":"Fischmeister S., Vigna G., Kemmerer R.A. (2001) Evaluating the security of three Java-based mobile agent systems. Lecture Notes in Computer Science 2240: 31\u201341","journal-title":"Lecture Notes in Computer Science"},{"key":"9043_CR23","unstructured":"Endsuleit, R., & Calmet, J. (2005). A security analysis on JADE(-S) V. 3.2. In Proceedings of NordSec, pp. 20\u201328."},{"key":"9043_CR24","unstructured":"Braun, P., & Rossak, W. (2005). Mobile agents. Basic concepts, mobility models and the tracy toolkit. dpunkt.verlag."},{"key":"9043_CR25","doi-asserted-by":"crossref","unstructured":"Santana Torrellas, G. (2004). A network security architectural approach for systems integrity using multi agent systems engineering. In International Symposium on Parallel Architectures, Algorithms and Networks (ISPAN).","DOI":"10.1109\/ISPAN.2004.1300544"},{"issue":"1","key":"9043_CR26","first-page":"2","volume":"10","author":"C. Hahn","year":"2007","unstructured":"Hahn C., Fley B., Florian M., Spresny D., Fischer K. (2007) Social reputation: A mechanism for flexible self-regulation of multiagent systems. Journal of Artificial Societies and Social Simulation 10(1): 2","journal-title":"Journal of Artificial Societies and Social Simulation"},{"key":"9043_CR27","unstructured":"AgentLink (2007). European co-ordination action for agent-based computing. http:\/\/eprints.agentlink.org\/view\/type\/software.html ."},{"key":"9043_CR28","unstructured":"FIPA: Foundation for Intelligent Physical Agents (2007). http:\/\/www.fipa.org ."},{"key":"9043_CR29","unstructured":"JADE Board (2005). JADE security guide. http:\/\/jade.tilab.com ."},{"key":"9043_CR30","unstructured":"Roth, V., Jalali, M., & Pinsdorf, U. (2007). Secure mobile agents (SeMoA). http:\/\/www.inigraphics.net\/press\/brochures\/sec_broch\/sec\/Security.pdf ."}],"container-title":["Autonomous Agents and Multi-Agent Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10458-008-9043-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10458-008-9043-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10458-008-9043-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T17:28:24Z","timestamp":1559150904000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10458-008-9043-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,4,6]]},"references-count":30,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2009,4]]}},"alternative-id":["9043"],"URL":"https:\/\/doi.org\/10.1007\/s10458-008-9043-z","relation":{},"ISSN":["1387-2532","1573-7454"],"issn-type":[{"value":"1387-2532","type":"print"},{"value":"1573-7454","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,4,6]]}}}