{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,23]],"date-time":"2025-05-23T04:06:58Z","timestamp":1747973218281,"version":"3.41.0"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2002,8,1]],"date-time":"2002-08-01T00:00:00Z","timestamp":1028160000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2002,8,1]],"date-time":"2002-08-01T00:00:00Z","timestamp":1028160000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mobile Networks and Applications"],"published-print":{"date-parts":[[2002,8]]},"DOI":"10.1023\/a:1015467429243","type":"journal-article","created":{"date-parts":[[2002,12,28]],"date-time":"2002-12-28T23:44:51Z","timestamp":1041119091000},"page":"315-328","source":"Crossref","is-referenced-by-count":14,"title":["Keep Your Data Safe and Available While Roaming"],"prefix":"10.1007","volume":"7","author":[{"given":"Yolanda","family":"Villate","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Arantza","family":"Illarramendi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Evaggelia","family":"Pitoura","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"issue":"1\u20132","key":"406467_CR1","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1016\/S0167-9236(99)00081-0","volume":"28","author":"Y. Amir","year":"2000","unstructured":"Y. Amir, B. Awerbuch and R.S. Borgstrom, A cost-benefit framework for online management of a metacomputing system, The International Journal for Decision Support Systems 28(1\u20132) (April 2000) 155\u2013164.","journal-title":"The International Journal for Decision Support Systems"},{"key":"406467_CR2","unstructured":"Cyber-Ark Software Ltd., http:\/\/www.cyber-ark.com\/"},{"key":"406467_CR3","unstructured":"Driveway Corporation, http:\/\/www.driveway.com\/"},{"key":"406467_CR4","doi-asserted-by":"crossref","unstructured":"M. Esler, J. Hightower, T. Anderson and G. Borriello, Next century challenges: Data-centric networking for invisible computing: The Portolano project at the University of Washington, in: Proceedings of the Fifth Annual International Conference on Mobile Computing and Networks (MobiCOM'99), Seattle, WA (August 1999).","DOI":"10.1145\/313451.313553"},{"key":"406467_CR5","unstructured":"Fleet Boston Financial Corporation, http:\/\/www.filetrust.com\/"},{"key":"406467_CR6","unstructured":"General Magic, Mobile agents white paper, in: General Magic Technology White Paper (1998)."},{"key":"406467_CR7","doi-asserted-by":"crossref","unstructured":"A. Go\u00f1i, A. Illarramendi, E. Mena, Y. Villate and J. Rodr\u00edguez, Antarctica: A multiagent system for internet data services in a wireless computing framework, in: NSF Workshop on an Infrastructure for Mobile and Wireless Systems, Scottsdale, AZ (October 2001).","DOI":"10.1007\/3-540-36257-6_11"},{"key":"406467_CR8","unstructured":"R. Gray, D. Rus and D. Kotz, Agent TCL: Targeting the needs of mobile computers, IEEE Internet Computing (1997)."},{"key":"406467_CR9","unstructured":"IBM Aglets Workbench Home Page, http:\/\/www.trl.ibm.co.jp\/aglets\/"},{"key":"406467_CR10","unstructured":"T. Imielinski and B.R. Badrinath, Mobile wireless computing: Challenges in data management, Communications of the ACM (October 1994) 19\u201327."},{"key":"406467_CR11","doi-asserted-by":"crossref","unstructured":"A. Joshi, S. Weerawarana and E. Houstis, On disconnected browsing of distributed information, in: IEEE RIDE97 (1997) pp. 101\u2013107.","DOI":"10.1109\/RIDE.1997.583714"},{"key":"406467_CR12","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/146941.146942","volume":"10","author":"J.J. Kistler","year":"1992","unstructured":"J.J. Kistler and M. Satyanarayanan, Disconnected operation in the Coda file system, ACM Transactions on Computer Systems 10 (1992) 3\u201325.","journal-title":"ACM Transactions on Computer Systems"},{"key":"406467_CR13","doi-asserted-by":"crossref","unstructured":"E. Kovacs, K. R\u00f6hrle and M. Reich, Mobile agents OnTheMove \u2013 integrating an agent system into the mobile middleware, in: Acts Mobile Summit, Rhodos, Greece (June 1998).","DOI":"10.1007\/BFb0057653"},{"key":"406467_CR14","unstructured":"Lexias Inc, http:\/\/www.mydigivault.com\/"},{"issue":"3","key":"406467_CR15","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/MCC.1999.788786","volume":"7","author":"D. Milojicic","year":"1999","unstructured":"D. Milojicic, Mobile agent applications, IEEE Concurrency 7(3) (1999) 80\u201390.","journal-title":"IEEE Concurrency"},{"key":"406467_CR16","doi-asserted-by":"crossref","unstructured":"Milojicic et al., MASIF, The OMGMobile Agent System Interoperability Facility, in: Proceedings of Mobile Agents'98 (September 1998).","DOI":"10.1007\/BFb0057648"},{"key":"406467_CR17","doi-asserted-by":"crossref","unstructured":"S. Papastavrou, G. Samaras and E. Pitoura, Mobile agents for WWW distributed database access, in: Proceedings of the International Conference on Data Engineering (1999).","DOI":"10.1109\/ICDE.1999.754928"},{"key":"406467_CR18","doi-asserted-by":"crossref","unstructured":"E. Pitoura and G. Samaras, Data Management for Mobile Computing (Kluwer Academic, 1998).","DOI":"10.1007\/978-1-4615-5527-8"},{"key":"406467_CR19","unstructured":"G. Samaras and A. Pitsillides, Client\/Intercept: a computational model for wireless environments, in: Proceedings of the 4th International Conference on Telecommunications (ICT'97) (April 1997)."},{"key":"406467_CR20","unstructured":"B. Schneier, Applied Cryptography, 2nd ed. (Wiley, 1996)."},{"key":"406467_CR21","doi-asserted-by":"crossref","unstructured":"C. Tschudin, Mobile agent security, in: Intelligent Information Agents \u2013 Agent Based Information Discovery and Management in the Internet, ed. M. Klusch (Springer-Verlag, 1999) pp. 431\u2013446.","DOI":"10.1007\/978-3-642-60018-0_22"},{"key":"406467_CR22","unstructured":"Xdrive Technologies, http:\/\/www.xdrive.com\/"},{"key":"406467_CR23","unstructured":"YourZ.com Inc., http:\/\/www.myspace.com\/"},{"key":"406467_CR24","unstructured":"Zephra Corporation, http: \/\/ www. securitymadesimple.com\/"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1015467429243.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1015467429243\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1015467429243.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T09:04:18Z","timestamp":1747904658000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1015467429243"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,8]]},"references-count":24,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2002,8]]}},"alternative-id":["406467"],"URL":"https:\/\/doi.org\/10.1023\/a:1015467429243","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"type":"print","value":"1383-469X"},{"type":"electronic","value":"1572-8153"}],"subject":[],"published":{"date-parts":[[2002,8]]}}}