{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T02:38:06Z","timestamp":1755225486557,"version":"3.43.0"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2002,11,1]],"date-time":"2002-11-01T00:00:00Z","timestamp":1036108800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2002,11,1]],"date-time":"2002-11-01T00:00:00Z","timestamp":1036108800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Networks"],"published-print":{"date-parts":[[2002,11]]},"DOI":"10.1023\/a:1020385804671","type":"journal-article","created":{"date-parts":[[2003,3,15]],"date-time":"2003-03-15T08:44:30Z","timestamp":1047717870000},"page":"619-635","source":"Crossref","is-referenced-by-count":11,"title":["Centaurus: An Infrastructure for Service Management in Ubiquitous Computing Environments"],"prefix":"10.1007","volume":"8","author":[{"given":"Lalana","family":"Kagal","sequence":"first","affiliation":[]},{"given":"Vladimir","family":"Korolev","sequence":"additional","affiliation":[]},{"given":"Sasikanth","family":"Avancha","sequence":"additional","affiliation":[]},{"given":"Anupam","family":"Joshi","sequence":"additional","affiliation":[]},{"given":"Tim","family":"Finin","sequence":"additional","affiliation":[]},{"given":"Yelena","family":"Yesha","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5095785_CR1","volume-title":"The Jini Specification","author":"K. Arnold","year":"1999","unstructured":"K. Arnold, A. Wollrath, B. O'sullivana, R. Scheifler and J. Waldo, The Jini Specification (Addison-Wesley, Reading, MA, 1999)."},{"key":"5095785_CR2","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1007\/3-540-48749-2_8","volume-title":"Secure Internet Programming","author":"M. Blaze","year":"1999","unstructured":"M. Blaze, J. Feigenbaum, J. Ioannidis and A. Keromytis, The role of trust management in distributed systems, in: Secure Internet Programming, LNCS Vol. 1603 (Springer, Berlin, 1999) pp. 185\u2013210."},{"key":"5095785_CR3","unstructured":"M. Blaze, J. Feigenbaum and J. Lacy, Decentralized trust management, in: IEEE Proceedings of the 17th Symposium (1996)."},{"key":"5095785_CR4","unstructured":"Bluetooth, http:\/\/www.bluetooth.com"},{"key":"5095785_CR5","doi-asserted-by":"crossref","unstructured":"M. Esler, J. Hightower, T. Anderson and G. Borriello, Next century challenges: Data-centric networking for invisible computing, in: Fifth Annual ACM\/IEEE International Conference on Mobile Computing and Networking (MobiCom'99) (ACM Press, August 1999) pp. 256\u2013262.","DOI":"10.1145\/313451.313553"},{"issue":"4","key":"5095785_CR6","doi-asserted-by":"crossref","first-page":"473","DOI":"10.1016\/S1389-1286(00)00179-1","volume":"35","author":"S.D. Gribble","year":"1999","unstructured":"S.D. Gribble et al., The Ninja architecture for robust Internet-scale systems and services, Computer Networks 35(4) (1999) 473\u2013497.","journal-title":"Computer Networks"},{"key":"5095785_CR7","unstructured":"Hewlett-Packard Company, Internet business solutions: E-Speak, http:\/\/www.e-speak.hp.com"},{"key":"5095785_CR8","unstructured":"T. Hodes and R.H. Katz, A document-based framework for Internet application control, in: Second USENIX Symposium on Internet Technologies and Systems (USITS'99) (October 1999)."},{"key":"5095785_CR9","unstructured":"T.D. Hodes, R.H. Katz, E. Servan-Schreiber and L. Rowe, An architecture for a secure service discovery service, in: 3rd ACM\/IEEE MobiCom, Budapest, Hungary (September 1997)."},{"key":"5095785_CR10","unstructured":"I. Horrocks et al., DAML +OIL language specifications (2001) http:\/\/www.daml.org\/2000\/12\/daml+oil-index"},{"key":"5095785_CR11","unstructured":"Infra-red, http:\/\/www.irda.org"},{"key":"5095785_CR12","unstructured":"F. Kon, C.K. Hess, M. Roman, R.H. Campbell and M.D. Mickuna, A flexible, interoperable framework for Active spaces, in: OOPSLA' 2000 Workshop on Pervasive Computing, Minneapolis (October 16, 2000)."},{"key":"5095785_CR13","unstructured":"D. Norman, The Invisible Computer (MIT Press, 1998)."},{"key":"5095785_CR14","doi-asserted-by":"crossref","unstructured":"S.R. Ponnekanti, B. Lee, A. Fox, P. Hanrahan and T. Winograd, ICrafter: A service framework for ubiquitous computing environments, in: Ubicomp 2001 (2001).","DOI":"10.1007\/3-540-45427-6_7"},{"key":"5095785_CR15","doi-asserted-by":"crossref","unstructured":"M. Roman and R.H. Campbell, Gaia: Enabling Active Spaces, in: Proceedings of the 9th ACM SIGOPS European Workshop, Kolding, Denmark (September 2000).","DOI":"10.1145\/566752.566772"},{"key":"5095785_CR16","doi-asserted-by":"crossref","unstructured":"M. Satyanarayanan, Pervasive computing: Vision and challenges, IEEE Communications (2001).","DOI":"10.1109\/98.943998"},{"key":"5095785_CR17","unstructured":"Stanford Interactive Workspaces Project, http:\/\/graphics.stanford.edu\/projects\/iwork\/"},{"key":"5095785_CR18","unstructured":"M. Taylor, W. Waung and M. Banan, Internetwork mobility: The CDPD approach, Prentice Hall professional technical reference, September 1996 (1999)."},{"key":"5095785_CR19","doi-asserted-by":"crossref","unstructured":"J. Undercoffer, A. Cedilnik, F. Perich, L. Kagal and A. Joshi, A secure infrastructure for service discovery and management in pervasive computing, Mobile Networks and Applications (2002).","DOI":"10.1023\/A:1022224912300"},{"key":"5095785_CR20","doi-asserted-by":"crossref","unstructured":"M. Weiser, The computer for the twenty-first century, Scientific American (September 1991) 94\u2013100.","DOI":"10.1038\/scientificamerican0991-94"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1020385804671.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1020385804671\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1020385804671.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T12:02:34Z","timestamp":1755086554000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1020385804671"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,11]]},"references-count":20,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2002,11]]}},"alternative-id":["5095785"],"URL":"https:\/\/doi.org\/10.1023\/a:1020385804671","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"type":"print","value":"1022-0038"},{"type":"electronic","value":"1572-8196"}],"subject":[],"published":{"date-parts":[[2002,11]]}}}