{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T15:03:46Z","timestamp":1648998226388},"reference-count":9,"publisher":"Informa UK Limited","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Security Journal: A Global Perspective"],"published-print":{"date-parts":[[2010,3,17]]},"DOI":"10.1080\/19393550903534088","type":"journal-article","created":{"date-parts":[[2010,3,21]],"date-time":"2010-03-21T07:12:26Z","timestamp":1269155546000},"page":"11-21","source":"Crossref","is-referenced-by-count":0,"title":["A Security Model for Securing Data in Multiagent Applications"],"prefix":"10.1080","volume":"19","author":[{"given":"D. S.","family":"Adane","sequence":"first","affiliation":[]},{"given":"S. R.","family":"Sathe","sequence":"additional","affiliation":[]}],"member":"301","reference":[{"key":"CIT0001","doi-asserted-by":"crossref","unstructured":"Adane, D. S., Sathe, S. R. and Adane, P. D. September 2007.Data privacy in mobile agent communication. Third IEEE\/IFIP International Conference in Central Asia on Internet (ICI)September, 26\u201328. Tashkent","DOI":"10.1109\/CANET.2007.4401685"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4379(99)00030-7"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1007\/BF02831861"},{"key":"CIT0008","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1016\/j.micpro.2004.08.008","volume":"28","author":"Jiang Y. C.","year":"2004","journal-title":"Microprocessors and Microsystems"},{"key":"CIT0009","doi-asserted-by":"crossref","unstructured":"McDonald, J. T., Yasinsac, A. and Thompson, W. September 2004.Mobile agent data integrity using multiagent architecture. Proceedings of the International Workshop on Security in Parallel and Distributed Systems (PDCS 2004), September, 14\u201317. CA: San Francisco.","DOI":"10.21236\/ADA425102"},{"key":"CIT0011","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1007\/3-540-48749-2_13","volume-title":"Secure Internet programming: security issues for mobile and distributed objects, vol. 1603 of lecture notes in computer science","author":"Roth V.","year":"1999"},{"key":"CIT0012","volume-title":"Software agents","author":"White J. E.","year":"1997"},{"key":"CIT0013","volume-title":"Lecture Notes in Computer Science, 3182, 164\u2013173, Springer Berlin\/Heidelberg","author":"Yao M.","year":"2004"}],"container-title":["Information Security Journal: A Global Perspective"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/19393550903534088","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T11:13:04Z","timestamp":1558955584000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/19393550903534088"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,3,17]]},"references-count":9,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2010,3,17]]}},"alternative-id":["10.1080\/19393550903534088"],"URL":"https:\/\/doi.org\/10.1080\/19393550903534088","relation":{},"ISSN":["1939-3555","1939-3547"],"issn-type":[{"value":"1939-3555","type":"print"},{"value":"1939-3547","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,3,17]]}}}