{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T05:34:14Z","timestamp":1740548054857,"version":"3.38.0"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2010,9,25]],"date-time":"2010-09-25T00:00:00Z","timestamp":1285372800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2011,6]]},"DOI":"10.1007\/s10922-010-9175-8","type":"journal-article","created":{"date-parts":[[2010,9,24]],"date-time":"2010-09-24T09:19:02Z","timestamp":1285319942000},"page":"230-256","source":"Crossref","is-referenced-by-count":4,"title":["Security Schemes for a Mobile Agent Based Network and System Management Framework"],"prefix":"10.1007","volume":"19","author":[{"given":"Ching-hang","family":"Fong","sequence":"first","affiliation":[]},{"given":"Gerard","family":"Parr","sequence":"additional","affiliation":[]},{"given":"Philip","family":"Morrow","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,9,25]]},"reference":[{"issue":"1","key":"9175_CR1","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1016\/j.jnca.2005.07.002","volume":"30","author":"KS Shin","year":"2007","unstructured":"Shin, K.S., Jung, J.H., Cheon, J.Y., Choi, S.B.: Real-time network monitoring scheme based on SNMP for dynamic information. J. Netw. Comput. Appl. 30(1), 331\u2013353 (2007)","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"9175_CR2","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1023\/B:JONS.0000015696.23905.66","volume":"12","author":"A Pashalidis","year":"2004","unstructured":"Pashalidis, A., Fleury, M.: Secure network management within an open-source mobile agent framework. J. Netw. Syst. Manage. 12(1), 9\u201331 (2004)","journal-title":"J. Netw. Syst. Manage."},{"issue":"4","key":"9175_CR3","doi-asserted-by":"crossref","first-page":"858","DOI":"10.1109\/JSAC.2002.1003050","volume":"20","author":"S Papavassiliou","year":"2002","unstructured":"Papavassiliou, S., Puliafito, A., Tomarchio, O., Ye, J.: Mobile agent-based approach for efficient network management and resource allocation: framework and applications. IEEE J. Selected Areas Commun 20(4), 858\u2013872 (2002)","journal-title":"IEEE J. Selected Areas Commun"},{"key":"9175_CR4","doi-asserted-by":"crossref","unstructured":"Martin, A., Leon, C., Monedero, I.: The evolution of OSI network management by integrated the expert knowledge. In: Proceedings of 7th international conference on intelligent data engineering and automated learning (IDEAL 2006), Burgos, Spain, pp. 402\u2013409 (2006)","DOI":"10.1007\/11875581_49"},{"key":"9175_CR5","doi-asserted-by":"crossref","unstructured":"Cabrera, J.B., Lewis, L., Qin, X., Gutierrez, C. et al.: Proactive intrusion detection and SNMP-based security management: new experiments and validation. IFIP\/IEEE 8th international symposium on integrated network management, Colorado Springs, CO, USA, pp. 93\u201396 (2003)","DOI":"10.1007\/978-0-387-35674-7_8"},{"key":"9175_CR6","doi-asserted-by":"crossref","unstructured":"Apostolopoulos, T.K., Daskalou, V.C.: Role of the time parameter in a network security management model. In: Proceedings of the 1997 2nd IEEE symposium on computers and communications, Alexandria, Egypt, pp. 528\u2013532 (1997)","DOI":"10.1109\/ISCC.1997.616059"},{"issue":"4","key":"9175_CR7","first-page":"2","volume":"35","author":"G Jiang","year":"2002","unstructured":"Jiang, G.: Multiple vulnerabilities in SNMP. IEEE J. Comput. 35(4), 2\u20134 (2002)","journal-title":"IEEE J. Comput."},{"key":"9175_CR8","unstructured":"Zhou, Y., Xiao, D.: Mobile agent-based policy management for wireless sensor networks. In: Proceedings of 2005 IEEE international conference on wireless communications, networking and mobile computing, Wuhan, China, pp. 1207\u20131210 (2005)"},{"issue":"10","key":"9175_CR9","first-page":"1119","volume":"13","author":"L Wang","year":"2005","unstructured":"Wang, L., Lu, X., Shi, H.: Distributed intelligent network management model based on CORBA. J. Comput. Measure. Control 13(10), 1119\u20131151 (2005)","journal-title":"J. Comput. Measure. Control"},{"issue":"1","key":"9175_CR10","first-page":"58","volume":"6","author":"K Young-Min","year":"2000","unstructured":"Young-Min, K., Won-Ki, H.: An implementation methodology of a gateway for inter-domain management between CORBA and SNMP. J. KISS Comput. Practices 6(1), 58\u201367 (2000)","journal-title":"J. KISS Comput. Practices"},{"issue":"6","key":"9175_CR11","doi-asserted-by":"crossref","first-page":"889","DOI":"10.1007\/s11036-006-0056-z","volume":"11","author":"V Stavroulaki","year":"2006","unstructured":"Stavroulaki, V., Demestichas, K., Adamopoulou, E., Demestichas, P.: Distributed Web-based management framework for ambient reconfigurable services in the intelligent environment. J. Mobile Netw. Appl. 11(6), 889\u2013900 (2006)","journal-title":"J. Mobile Netw. Appl."},{"key":"9175_CR12","unstructured":"Fong, C.-h.: A mobile agent framework for security enhanced and autonomic network and system management. PhD Thesis, University of Ulster, UK (2008)"},{"key":"9175_CR13","unstructured":"The Foundation for Intelligent Physical Agents (FIPA). Official Web Site, 2007, Available online at http:\/\/www.fipa.org\/"},{"key":"9175_CR14","unstructured":"FIPA Abstract Architecture Specification. Version L, FIPA00001, FIPA Specification, 2002, Available online at http:\/\/www.fipa.org\/specs\/fipa00001\/SC00001L.pdf"},{"key":"9175_CR15","unstructured":"FIPA ACL Message Structure Specification. Version G, FIPA00061, FIPA Specification, 2002, Available online at http:\/\/www.fipa.org\/specs\/fipa00061\/SC00061G.pdf"},{"key":"9175_CR16","unstructured":"Helin, H., Laukkanen, M.: Towards efficient and reliable agent communication in wireless environments. Cooperative information agents V: 5th international workshop, CIA 2001, Modena, Italy, September 6\u20138, 2001. Proceedings, pp 258, (2001)"},{"key":"9175_CR17","unstructured":"FIPA Agent Message Transport Protocol for IIOP Specification. Version G, FIPA00075, FIPA Specification, 2002, Available online at http:\/\/www.fipa.org\/specs\/fipa00075\/SC00075G.pdf"},{"key":"9175_CR18","unstructured":"Barker, E., Barker, W., Burr, W., Polk, W. et al.: Recommendation for Key Management\u2014Part 1: General (Revised). NIST Special Publication 800-57, National Institute of Standards and Technology (NIST), 2007, Available online at http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-57\/sp800-57-Part1-revised2_Mar08-2007.pdf"},{"key":"9175_CR19","unstructured":"SNMPv3 White Paper. SNMP Research International, 2007, Available online at http:\/\/www.snmp.com\/snmpv3\/v3white.shtml"},{"key":"9175_CR20","doi-asserted-by":"crossref","unstructured":"Eung-Gu, Y., Keum-Suk, L.: A mobile agent security management. In: 18th International conference on advanced information networking and applications, Fukuoka, Japan, pp 360\u2013365 (2004)","DOI":"10.1109\/AINA.2004.1283823"},{"key":"9175_CR21","doi-asserted-by":"crossref","unstructured":"Fong, C.-h., Parr, G.P., Morrow P.J.: Performance evaluation of a mobile agent based framework for security event management in IP networks. In: Managing next generation networks and services. Springer, pp 476\u2013486 (2007)","DOI":"10.1007\/978-3-540-75476-3_48"}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-010-9175-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10922-010-9175-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-010-9175-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T01:22:41Z","timestamp":1740532961000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10922-010-9175-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,9,25]]},"references-count":21,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2011,6]]}},"alternative-id":["9175"],"URL":"https:\/\/doi.org\/10.1007\/s10922-010-9175-8","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"type":"print","value":"1064-7570"},{"type":"electronic","value":"1573-7705"}],"subject":[],"published":{"date-parts":[[2010,9,25]]}}}