{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T21:17:16Z","timestamp":1760044636470},"reference-count":50,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[2002,5,1]],"date-time":"2002-05-01T00:00:00Z","timestamp":1020211200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Systems and Software"],"published-print":{"date-parts":[[2002,5]]},"DOI":"10.1016\/s0164-1212(01)00129-7","type":"journal-article","created":{"date-parts":[[2002,10,14]],"date-time":"2002-10-14T16:48:11Z","timestamp":1034614091000},"page":"123-140","source":"Crossref","is-referenced-by-count":31,"title":["Design of the Ajanta system for mobile agent programming"],"prefix":"10.1016","volume":"62","author":[{"given":"Anand R.","family":"Tripathi","sequence":"first","affiliation":[]},{"given":"Neeran M.","family":"Karnik","sequence":"additional","affiliation":[]},{"given":"Tanvir","family":"Ahmed","sequence":"additional","affiliation":[]},{"given":"Ram D.","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Arvind","family":"Prakash","sequence":"additional","affiliation":[]},{"given":"Vineet","family":"Kakani","sequence":"additional","affiliation":[]},{"given":"Manish K.","family":"Vora","sequence":"additional","affiliation":[]},{"given":"Mukta","family":"Pathak","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0164-1212(01)00129-7_BIB1","article-title":"A secure active network environment architecture","author":"Alexander","year":"1997","journal-title":"IEEE Network"},{"key":"10.1016\/S0164-1212(01)00129-7_BIB2","series-title":"Second International Conference on Autonomous Agents, May 1998","first-page":"108","article-title":"Agent design patterns: elements of agent application design","author":"Aridor","year":"1998"},{"key":"10.1016\/S0164-1212(01)00129-7_BIB3","series-title":"Proceedings of ICDCS, May 1998","first-page":"398","article-title":"Experience with secure multi-processing in Java","author":"Balfanz","year":"1998"},{"key":"10.1016\/S0164-1212(01)00129-7_BIB4","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1016\/0164-1212(86)90041-5","article-title":"Parallelism and fault tolerance in Chorus","author":"Banino","year":"1986","journal-title":"Journal of Systems and Software"},{"key":"10.1016\/S0164-1212(01)00129-7_BIB5","author":"Baumann"},{"key":"10.1016\/S0164-1212(01)00129-7_BIB6","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/2.820044","article-title":"Mobile-agent coordination models for Internet applications","author":"Cabri","year":"2000","journal-title":"IEEE Computer"},{"issue":"6","key":"10.1016\/S0164-1212(01)00129-7_BIB7","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1016\/S0306-4379(99)00030-7","article-title":"Mobile agents integrity and electronic commerce applications","volume":"24","author":"Corradi","year":"1999","journal-title":"Information Systems"},{"key":"10.1016\/S0164-1212(01)00129-7_BIB8","unstructured":"FIPA, 1998. FIPA (Foundation for Intelligent Physical Agents) 98 specification. Available from <http:\/\/drogo.cselt.it\/fipa\/spec\/fipa98>"},{"key":"10.1016\/S0164-1212(01)00129-7_BIB9","unstructured":"Fritzinger, J.S., Mueller, M., 1996. Java security. Technical report, Sun Microsystems. Available from <http:\/\/www.javasoft.com\/security>"},{"issue":"5","key":"10.1016\/S0164-1212(01)00129-7_BIB10","doi-asserted-by":"crossref","first-page":"342","DOI":"10.1109\/32.685258","article-title":"Understanding code mobility","volume":"24","author":"Fuggetta","year":"1998","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/S0164-1212(01)00129-7_BIB11","series-title":"Proceedings of the First International Symposium on Agent Systems and Applications and the Third International Symposium on Mobile Agent Systems (ASA\/MA'99), October 1999","first-page":"90","article-title":"Protecting mobile web commerce agents with smartcards","author":"Funfrocken","year":"1999"},{"key":"10.1016\/S0164-1212(01)00129-7_BIB12","series-title":"IEEE Symposium on Security and Privacy","first-page":"56","article-title":"A secure identity-based capability system","author":"Gong","year":"1989"},{"key":"10.1016\/S0164-1212(01)00129-7_BIB13","series-title":"The Java Language Specification","author":"Gosling","year":"1996"},{"key":"10.1016\/S0164-1212(01)00129-7_BIB14","series-title":"Proceedings of the Fourth Annual Tcl\/Tk Workshop (TCL 96), July 1996","first-page":"9","article-title":"Agent Tcl: a flexible and secure mobile-agent system","author":"Gray","year":"1996"},{"key":"10.1016\/S0164-1212(01)00129-7_BIB15","series-title":"Proceedings of the Third ACM\/IEEE International Conference on Mobile Computing and Networking, September 1997","first-page":"215","article-title":"A protection scheme for mobile agents on Java","author":"Hagimont","year":"1997"},{"key":"10.1016\/S0164-1212(01)00129-7_BIB16","unstructured":"Harrison, C.G., Chess, D.M., Kershenbaum, A., 1995. Mobile Agents: Are they a good idea? Technical report, IBM Research Division, T.J. Watson Research Center. Available from <http:\/\/www.research.ibm.com\/massdist\/mobag.ps>"},{"key":"10.1016\/S0164-1212(01)00129-7_BIB17","series-title":"Mobile Agents and Security","first-page":"92","article-title":"Time limited blackbox security: protecting mobile agents from malicious hosts","volume":"vol. 1419","author":"Hohl","year":"1998"},{"key":"10.1016\/S0164-1212(01)00129-7_BIB18","unstructured":"IBM, 1998. JMT (Java-based Moderator Templates) Specification \u2013 Alpha3. Available from <http:\/\/www.trl.ibm.co.jp\/aglets\/jmt>"},{"key":"10.1016\/S0164-1212(01)00129-7_BIB19","unstructured":"IBM, 2000. IBM Aglets Workbench Documentation web page. Available from <http:\/\/www.trl.ibm.co.jp\/aglets>"},{"key":"10.1016\/S0164-1212(01)00129-7_BIB20","series-title":"Proceedings of the 19th International Conference on Distributed Computing Systems, May 1999","first-page":"180","article-title":"NAP: practical fault-tolerant for itinerant computations","author":"Johansen","year":"1999"},{"key":"10.1016\/S0164-1212(01)00129-7_BIB21","series-title":"Proceedings of the Fifth IEEE Workshop on Hot Topics in Operating Systems (HotOS-V), May 1995","first-page":"42","article-title":"Operating system support for mobile agents","author":"Johansen","year":"1995"},{"issue":"1","key":"10.1016\/S0164-1212(01)00129-7_BIB22","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1145\/35037.42182","article-title":"Fine-grained mobility in the emerald system","volume":"6","author":"Jul","year":"1988","journal-title":"ACM Transactions on Computer Systems"},{"key":"10.1016\/S0164-1212(01)00129-7_BIB23","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1109\/4236.612220","article-title":"A security model for Aglets","author":"Karjoth","year":"1997","journal-title":"IEEE Internet Computing"},{"key":"10.1016\/S0164-1212(01)00129-7_BIB24","series-title":"Proceedings of the 20th IEEE International Conference on Distributed Computing Systems, April 2000","first-page":"402","article-title":"A security architecture for mobile agents in Ajanta","author":"Karnik","year":"2000"},{"key":"10.1016\/S0164-1212(01)00129-7_BIB25","doi-asserted-by":"crossref","unstructured":"Karnik, N.M., 1998. Security in mobile agent systems. Ph.D. Thesis, University of Minnesota","DOI":"10.1109\/4434.708256"},{"issue":"6","key":"10.1016\/S0164-1212(01)00129-7_BIB26","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/4434.708256","article-title":"Design issues in mobile agent programming systems","volume":"6","author":"Karnik","year":"1998","journal-title":"IEEE Concurrency"},{"key":"10.1016\/S0164-1212(01)00129-7_BIB27","author":"Magedanz"},{"key":"10.1016\/S0164-1212(01)00129-7_BIB28","series-title":"Proceedings of the First International Workshop on Mobile Agents (MA'97), April 1997","first-page":"86","article-title":"Concordia: an infrastructure for collaborating mobile agents","author":"Mitsubishi","year":"1997"},{"key":"10.1016\/S0164-1212(01)00129-7_BIB29","doi-asserted-by":"crossref","unstructured":"Moats, R., 1997. RFC 2141: URN Syntax. Available from <http:\/\/www.cis.ohio-state.edu\/htbin\/rfc\/rfc2141.html>","DOI":"10.17487\/rfc2141"},{"key":"10.1016\/S0164-1212(01)00129-7_BIB30","series-title":"Proceedings of the 13th International Conference on Distributed Computing Systems, May 1993","first-page":"283","article-title":"Proxy-based authorization and accounting for distributed systems","author":"Neuman","year":"1993"},{"key":"10.1016\/S0164-1212(01)00129-7_BIB31","unstructured":"ObjectSpace, 1997. ObjectSpace Voyager Core Package Technical Overview. Technical report, ObjectSpace, Inc. Available from <http:\/\/www.objectspace.com\/>"},{"key":"10.1016\/S0164-1212(01)00129-7_BIB32","series-title":"Proceedings of the First International Workshop on Mobile Agents (MA'97), April 1997","first-page":"50","article-title":"The architecture of the Ara platform for mobile agents","volume":"vol. 1219","author":"Peine","year":"1997"},{"key":"10.1016\/S0164-1212(01)00129-7_BIB33","series-title":"Proceedings of USENIX '97, Winter 1997","article-title":"Network-aware mobile programs","author":"Ranganathan","year":"1997"},{"key":"10.1016\/S0164-1212(01)00129-7_BIB34","series-title":"Mobile Agents and Security","first-page":"44","article-title":"Protecting mobile agents against malicious hosts","volume":"vol. 1419","author":"Sander","year":"1998"},{"key":"10.1016\/S0164-1212(01)00129-7_BIB35","series-title":"Proceedings of the Sixth International Conference on Distributed Computing Systems, IEEE, 1986","first-page":"198","article-title":"Structure and encapsulation in distributed systems: the proxy principle","author":"Shapiro","year":"1986"},{"key":"10.1016\/S0164-1212(01)00129-7_BIB36","doi-asserted-by":"crossref","unstructured":"Sollins, K., Masinter, L., 1994. RFC 1737: functional requirements for uniform resource names. Available from <http:\/\/www.cis.ohio-state.edu\/htbin\/rfc\/rfc1737.html>","DOI":"10.17487\/rfc1737"},{"issue":"4","key":"10.1016\/S0164-1212(01)00129-7_BIB37","doi-asserted-by":"crossref","first-page":"537","DOI":"10.1145\/88616.88631","article-title":"Remote evaluation","volume":"12","author":"Stamos","year":"1990","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"10.1016\/S0164-1212(01)00129-7_BIB38","series-title":"Proceedings of the Second ECOOP Workshop on Mobile Object Systems, 1996","article-title":"Mole \u2013 a Java based mobile agent system","author":"Stra\u00dfer","year":"1996"},{"issue":"4","key":"10.1016\/S0164-1212(01)00129-7_BIB39","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1142\/S0218843098000179","article-title":"Reliability concepts for mobile agents","volume":"7","author":"Stra\u00dfer","year":"1998","journal-title":"International Journal of Cooperative Information Systems (IJCIS)"},{"key":"10.1016\/S0164-1212(01)00129-7_BIB40","series-title":"Proceedings of COMPCON Spring '96, IEEE, 1996","first-page":"58","article-title":"Mobile agent security and Telescript","author":"Tardo","year":"1996"},{"issue":"1","key":"10.1016\/S0164-1212(01)00129-7_BIB41","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/35.568214","article-title":"A survey of active network research","volume":"35","author":"Tennenhouse","year":"1997","journal-title":"IEEE Communications Magazine"},{"issue":"3","key":"10.1016\/S0164-1212(01)00129-7_BIB42","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1145\/262009.262010","article-title":"Programming languages for mobile code","volume":"29","author":"Thorn","year":"1997","journal-title":"ACM Computing Surveys"},{"key":"10.1016\/S0164-1212(01)00129-7_BIB43","series-title":"Proceedings of the Second International Symposium on Agent Systems and Applications and the Third International Symposium on Mobile Agent Systems (ASA\/MA'2000), September 2000","first-page":"126","article-title":"Distributed collaborations using network mobile agents","author":"Tripathi","year":"2000"},{"key":"10.1016\/S0164-1212(01)00129-7_BIB44","series-title":"Proceedings of the First International Conference on Internet Computing (IC'2000), June 2000","first-page":"379","article-title":"Delegation of privileges to mobile agents in Ajanta","author":"Tripathi","year":"2000"},{"key":"10.1016\/S0164-1212(01)00129-7_BIB45","series-title":"Proceedings of the 19th International Conference on Distributed Computing Systems, May 1999","first-page":"190","article-title":"Mobile agent programming in Ajanta","author":"Tripathi","year":"1999"},{"key":"10.1016\/S0164-1212(01)00129-7_BIB46","unstructured":"Vigna, G., June 1997. Protecting mobile agents through tracing. In: Proceedings of the Third International Workshop on Mobile Object Systems, Finland"},{"key":"10.1016\/S0164-1212(01)00129-7_BIB47","series-title":"Mobile Agents and Security","first-page":"137","article-title":"Cryptographic traces for mobile agents","volume":"vol. 1419","author":"Vigna","year":"1998"},{"key":"10.1016\/S0164-1212(01)00129-7_BIB48","series-title":"Computer Message System","first-page":"175","article-title":"Active message processing: messages as messengers","author":"Vittal","year":"1981"},{"key":"10.1016\/S0164-1212(01)00129-7_BIB49","series-title":"Proceedings of the 31st Annual Hawaii International Conference on System Sciences (HICSS31), January 1998","article-title":"Security and reliability in concordia","author":"Walsh","year":"1998"},{"key":"10.1016\/S0164-1212(01)00129-7_BIB50","unstructured":"White, J.E., October 1995. Mobile agents. Technical report, General Magic"}],"container-title":["Journal of Systems and Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121201001297?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121201001297?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,29]],"date-time":"2019-04-29T15:50:09Z","timestamp":1556553009000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0164121201001297"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,5]]},"references-count":50,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2002,5]]}},"alternative-id":["S0164121201001297"],"URL":"https:\/\/doi.org\/10.1016\/s0164-1212(01)00129-7","relation":{},"ISSN":["0164-1212"],"issn-type":[{"value":"0164-1212","type":"print"}],"subject":[],"published":{"date-parts":[[2002,5]]}}}