{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T10:43:08Z","timestamp":1742380988493},"reference-count":11,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2003,3,1]],"date-time":"2003-03-01T00:00:00Z","timestamp":1046476800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2013,7,29]],"date-time":"2013-07-29T00:00:00Z","timestamp":1375056000000},"content-version":"vor","delay-in-days":3803,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electronic Notes in Theoretical Computer Science"],"published-print":{"date-parts":[[2003,3]]},"DOI":"10.1016\/s1571-0661(05)80375-5","type":"journal-article","created":{"date-parts":[[2005,5,19]],"date-time":"2005-05-19T13:46:30Z","timestamp":1116510390000},"page":"310-327","source":"Crossref","is-referenced-by-count":10,"title":["SecSpaces: a Data-driven Coordination Model for Environments Open to Untrusted Agent\u2217"],"prefix":"10.1016","volume":"68","author":[{"given":"Nadia","family":"Busi","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Roberto","family":"Gorrieri","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Roberto","family":"Lucchi and","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Gianluigi","family":"Zavattaro","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/S1571-0661(05)80375-5_BIBGEL85","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1145\/2363.2433","article-title":"Generative Communication in Linda","volume":"7","author":"Gelernter","year":"1985","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"10.1016\/S1571-0661(05)80375-5_BIBGJS96","series-title":"The Java Language Specification","author":"Gosling","year":"1996"},{"issue":"1","key":"10.1016\/S1571-0661(05)80375-5_BIBMMU01","doi-asserted-by":"crossref","DOI":"10.1080\/08839510150204590","article-title":"Safe Tuplespace Based Coordination in Multi Agent Systems","volume":"15","author":"Minsky","year":"2001","journal-title":"Journal of Applied Artificial Intelligence"},{"key":"10.1016\/S1571-0661(05)80375-5_BIBNFP97","first-page":"220","article-title":"Coordinating Mobile Agents via Blackboards and Access Rights","author":"De Nicola","year":"1997","journal-title":"Proc. of the Second International Conference on Coordination Models and Languages, Lectures Notes in Computer Science 1282, Springer"},{"issue":"5","key":"10.1016\/S1571-0661(05)80375-5_BIBNFP98","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1109\/32.685256","article-title":"KLAIM: A Kernel Language for Agents Interaction and Mobility","volume":"24","author":"De Nicola","year":"1998","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/S1571-0661(05)80375-5_BIBPIN92","first-page":"731","article-title":"Providing directed communication in Linda","author":"Pinakis","year":"1992","journal-title":"Proceedings of the 15th Australian Computer Science Conference"},{"key":"10.1016\/S1571-0661(05)80375-5_BIBPSD98","article-title":"TSpaces","author":"Wyckoff","year":"1998","journal-title":"IBM System Journal"},{"issue":"2","key":"10.1016\/S1571-0661(05)80375-5_BIBRSA78","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public-key cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Communication of the ACM"},{"key":"10.1016\/S1571-0661(05)80375-5_BIBSUN02","unstructured":"Sun Microsystems, Inc. JavaSpaces(TM) Service Specification, 2002. URL: http:\/\/www.sun.com\/jini\/specs\/."},{"key":"10.1016\/S1571-0661(05)80375-5_BIBVBO02","article-title":"Coordinating Processes with Secure Spaces","author":"Vitek","year":"2002","journal-title":"To appear in Science of Computer Programming"},{"key":"10.1016\/S1571-0661(05)80375-5_BIBWOO99","first-page":"21","article-title":"Coordination with Attributes","author":"Wood","year":"1999","journal-title":"Proceedings of the Third International Conference COORDINATION '99, Springer LNCS-1594"}],"container-title":["Electronic Notes in Theoretical Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066105803755?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066105803755?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,1,26]],"date-time":"2019-01-26T10:58:13Z","timestamp":1548500293000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1571066105803755"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,3]]},"references-count":11,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2003,3]]}},"alternative-id":["S1571066105803755"],"URL":"https:\/\/doi.org\/10.1016\/s1571-0661(05)80375-5","relation":{},"ISSN":["1571-0661"],"issn-type":[{"value":"1571-0661","type":"print"}],"subject":[],"published":{"date-parts":[[2003,3]]}}}