{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T20:24:40Z","timestamp":1761596680079},"reference-count":29,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2002,2,1]],"date-time":"2002-02-01T00:00:00Z","timestamp":1012521600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2002,2]]},"DOI":"10.1016\/s1389-1286(01)00291-2","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T03:52:30Z","timestamp":1027569150000},"page":"347-371","source":"Crossref","is-referenced-by-count":14,"title":["Securing distributed adaptation"],"prefix":"10.1016","volume":"38","author":[{"given":"Jun","family":"Li","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mark","family":"Yarvis","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Peter","family":"Reiher","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"issue":"3","key":"10.1016\/S1389-1286(01)00291-2_BIB1","doi-asserted-by":"crossref","DOI":"10.1109\/65.690960","article-title":"A secure active network environment architecture: realization in SwitchWare","volume":"12","author":"Alexander","year":"1998","journal-title":"IEEE Network"},{"key":"10.1016\/S1389-1286(01)00291-2_BIB2","unstructured":"D. Balfanz, E.W. Felten, A Java filter, Technical Report 567-97, Dept of Computer Science, Princeton University, September 1997"},{"key":"10.1016\/S1389-1286(01)00291-2_BIB3","doi-asserted-by":"crossref","unstructured":"M. Blaze, J. Feigenbaum, J. Ioannidis, A. Keromytis, The KeyNote trust-management system version 2, RFC 2704, September 1999","DOI":"10.17487\/rfc2704"},{"key":"10.1016\/S1389-1286(01)00291-2_BIB4","doi-asserted-by":"crossref","unstructured":"R.H. Campbell, Z. Liu, M.D. Mickunas, P. Naldurg, S. Yi, Seraphim: dynamic interoperable security architecture for active networks, in: Proceedings of IEEE OPENARCH 2000, Tel-Aviv, Israel, March 2000","DOI":"10.1109\/OPNARC.2000.828133"},{"key":"10.1016\/S1389-1286(01)00291-2_BIB5","doi-asserted-by":"crossref","unstructured":"M. Clifford, C. Lavine, M. Bishop, The solar trust model: authentication without limitation, in: Proceedings of 14th Annual Computer Security Applications Conference, Scottsdale, AZ, December 1998","DOI":"10.1109\/CSAC.1998.738650"},{"key":"10.1016\/S1389-1286(01)00291-2_BIB6","unstructured":"The Cryptix cryptographic library, available at http:\/\/www.cryptix.org"},{"key":"10.1016\/S1389-1286(01)00291-2_BIB7","unstructured":"R. Dandekar, S. Schwab, A new hop-hop integrity model for active nets, AMP Project, NAI Labs, May 2000"},{"key":"10.1016\/S1389-1286(01)00291-2_BIB8","doi-asserted-by":"crossref","unstructured":"D.C. Feldmeier, A.J. McAuley, J.M. Smith, D.S. Bakin, W.S. Marcus, T.M. Raleigh, Protocol boosters, IEEE Journal on Selected Areas in Communication (Special Issue on Protocol Architectures for 21st Century Applications) 16 (3) (1998)","DOI":"10.1109\/49.669053"},{"key":"10.1016\/S1389-1286(01)00291-2_BIB9","doi-asserted-by":"crossref","unstructured":"D. Harkins, D. Carrel, The Internet key exchange (IKE), RFC 2409, November 1998","DOI":"10.17487\/rfc2409"},{"key":"10.1016\/S1389-1286(01)00291-2_BIB10","unstructured":"IBM JDK 1.1.8, available at http:\/\/www.ibm.com\/java\/jdk"},{"key":"10.1016\/S1389-1286(01)00291-2_BIB11","unstructured":"International Telecommunication Union, Information technology\u2013\u2013open systems interconnection\u2013\u2013the directory: authentication framework, ITU-T Recommendation X.509, 1995"},{"key":"10.1016\/S1389-1286(01)00291-2_BIB12","unstructured":"A.W. Jackson, Security issues for stateless programmable networks, panel session on security issues in programmable networks, IEEE OPENARCH 1999, New York, March 1999"},{"key":"10.1016\/S1389-1286(01)00291-2_BIB13","unstructured":"JavaTM Cryptography Architecture, available at http:\/\/java.sun.com\/security"},{"key":"10.1016\/S1389-1286(01)00291-2_BIB14","doi-asserted-by":"crossref","unstructured":"S. Kent, Privacy enhancement for Internet electronic mail: part II: certificate-based key management, RFC 1422, BBN, February 1993","DOI":"10.17487\/rfc1422"},{"key":"10.1016\/S1389-1286(01)00291-2_BIB15","doi-asserted-by":"crossref","unstructured":"S. Kent, R. Atkinson, Security architecture for the Internet protocol, RFC 2401, November 1998","DOI":"10.17487\/rfc2401"},{"key":"10.1016\/S1389-1286(01)00291-2_BIB16","doi-asserted-by":"crossref","unstructured":"D. Maughan, M. Schertler, M. Schneider, J. Turner, Internet security association and key management protocol (ISAKMP), RFC 2408, November 1998","DOI":"10.17487\/rfc2408"},{"key":"10.1016\/S1389-1286(01)00291-2_BIB17","unstructured":"P. McDaniel, A. Prakash, P. Honeyman, Antigone: a flexible framework for secure group communication, in: Proceedings of the 8th USENIX Security Symposium, August 1999"},{"key":"10.1016\/S1389-1286(01)00291-2_BIB18","unstructured":"G. McGraw, E.W. Felten, Securing Java: Getting Down to Business with Mobile Code, Wiley, New York, 1999. Also available at http:\/\/www.securingjava.com"},{"key":"10.1016\/S1389-1286(01)00291-2_BIB19","unstructured":"S. Murphy, T. Samples, Secure active network prototypes, NAI Labs, Network Associates, 1999. Available at http:\/\/www.darpa.mil\/ito\/psum1999\/G796-0.html"},{"key":"10.1016\/S1389-1286(01)00291-2_BIB20","unstructured":"S. Murphy, Design issues affecting security for active networks, panel session on security issues in programmable networks, IEEE OPENARCH 1999, New York, March 1999"},{"issue":"9","key":"10.1016\/S1389-1286(01)00291-2_BIB21","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/35.312841","article-title":"Kerberos: an authentication service for computer networks","volume":"32","author":"Neuman","year":"1994","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/S1389-1286(01)00291-2_BIB22","unstructured":"NIST (National Institute of Standards and Technology), Secure hash standard, FIPS Publication, 180-1, April 1995. Also available at http:\/\/www.itl.nist.gov\/fipspubs\/fip180-1.htm"},{"key":"10.1016\/S1389-1286(01)00291-2_BIB23","unstructured":"Panda project home page, available at http:\/\/fmg-www.cs.ucla.edu\/Panda"},{"key":"10.1016\/S1389-1286(01)00291-2_BIB24","unstructured":"P. Reiher, R. Guy, M. Yarvis, A. Rudenko, Automated planning for open architectures, short paper presented at IEEE OPENARCH 2000, Tel-Aviv, Israel, March 2000"},{"key":"10.1016\/S1389-1286(01)00291-2_BIB25","doi-asserted-by":"crossref","unstructured":"R. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signature and public key cryptosystems, Communications of the ACM 21 (2) (1978)","DOI":"10.1145\/359340.359342"},{"key":"10.1016\/S1389-1286(01)00291-2_BIB26","doi-asserted-by":"crossref","unstructured":"A.D. Rubin, D.E. Geer, Mobile code security, IEEE Internet Computing, November 1998","DOI":"10.1109\/4236.735984"},{"key":"10.1016\/S1389-1286(01)00291-2_BIB27","unstructured":"V. Varadharajan, R. Shankaran, M. Hitchens, Active networks and security, in: Proceedings 22nd National Information Systems Security Conference, vol. 1, Arlington, VA, October 1999"},{"key":"10.1016\/S1389-1286(01)00291-2_BIB28","unstructured":"M. Yarvis, A. Rudenko, P. Reiher, K. Eustice, G. Popek, Conductor: enabling distributed adaptation, UCLA Tech Report, CSD-TR-010025, June 2001. Available at http:\/\/fmg-www.cs.ucla.edu\/Conductor\/CSD-TR-010025.ps"},{"key":"10.1016\/S1389-1286(01)00291-2_BIB29","doi-asserted-by":"crossref","unstructured":"B. Zenel, D. Duchamp, A general purpose proxy filtering mechanism applied to the mobile environment, in: Proceedings of MobiCom'97, Budapest, Hungary, October 1997","DOI":"10.1145\/262116.262153"}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128601002912?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128601002912?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,1,7]],"date-time":"2020-01-07T13:46:52Z","timestamp":1578404812000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128601002912"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,2]]},"references-count":29,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2002,2]]}},"alternative-id":["S1389128601002912"],"URL":"https:\/\/doi.org\/10.1016\/s1389-1286(01)00291-2","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[2002,2]]}}}