{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:53:48Z","timestamp":1754157228734,"version":"3.41.2"},"reference-count":31,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[1999,12,1]],"date-time":"1999-12-01T00:00:00Z","timestamp":944006400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999,12,1]]},"abstract":"<jats:p>The increasing dimension and heterogeneity of global Web systems make their management with tools based on the client\/server model more difficult. The mobile agent technology overcomes the limits of traditional approaches and proposes solutions that are suitable for the management of distributed and heterogeneous Internet\u2010based systems. The paper describes the MAMAS environment and its implementation with a mobile agent technology. MAMAS has the goals of monitoring the whole system, introducing dynamic corrective actions and modifying system policies at run\u2010time. MAMAS achieves these objectives by answering the guidelines of both security and compliance to standards. The choice of Java as the implementation language has made it possible to achieve portability, to exploit the language security features, and to provide Web accessibility. The MAMAS compliance with CORBA ensures interoperability with legacy management platforms.<\/jats:p>","DOI":"10.1108\/10662249910297769","type":"journal-article","created":{"date-parts":[[2002,7,27]],"date-time":"2002-07-27T02:08:10Z","timestamp":1027735690000},"page":"360-371","source":"Crossref","is-referenced-by-count":3,"title":["Mobile agents for Web\u2010based systems management"],"prefix":"10.1108","volume":"9","author":[{"given":"Paolo","family":"Bellavista","sequence":"first","affiliation":[]},{"given":"Antonio","family":"Corradi","sequence":"additional","affiliation":[]},{"given":"Fabio","family":"Tarantino","sequence":"additional","affiliation":[]},{"given":"Cesare","family":"Stefanelli","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022020820003622000_B1","doi-asserted-by":"crossref","unstructured":"Baldi, M., Gai, S. and Picco, G. (1997), \u201cExploiting code mobility in decentralized and flexible management\u201d, Proc. 1st International Workshop on Mobile Agents, Berlin (D), Lecture Notes in Computer Science, No. 1219, Springer\u2010Verlag.","DOI":"10.1007\/3-540-62803-7_20"},{"key":"key2022020820003622000_B2","unstructured":"Bellavista, P., Corradi, A. and Stefanelli, C. (1999), \u201cAn open secure mobile agent framework for systems management\u201d, to be published in Journal of Network and Systems Management, Vol. 7 No. 3."},{"key":"key2022020820003622000_B3","unstructured":"Bieszczad, A., Pagurek, B. and Susilo, G. (1998), \u201cInfrastructure for advanced network management based on mobile code\u201d, IEEE\/IFIP Network Operations and Management Symposium NOMS\u201998, New Orleans, LA."},{"key":"key2022020820003622000_B4","doi-asserted-by":"crossref","unstructured":"Case, J. et al. (1990), Simple Network Management Protocol (RFC 1157), DDN Network Information Center, SRI International.","DOI":"10.17487\/rfc1157"},{"key":"key2022020820003622000_B5","unstructured":"Dickson, G. and Loyd, A. (1992), in Trevor Housley (Ed.), Open Systems Interconnection, Prentice\u2010Hall, Englewood Cliffs, NJ."},{"key":"key2022020820003622000_B6","doi-asserted-by":"crossref","unstructured":"Finkel, R.A. (1997), \u201cPulsar: an extensible tool for monitoring large Unix sites\u201d, Software Practice and Experience, Vol. 27 No. 10.","DOI":"10.1002\/(SICI)1097-024X(199710)27:10<1163::AID-SPE124>3.0.CO;2-N"},{"key":"key2022020820003622000_B7","doi-asserted-by":"crossref","unstructured":"Fuggetta, A., Picco, G.P. and Vigna, G. (1998), \u201cUnderstanding code mobility\u201d, IEEE Transactions on Software Engineering, Vol. 24 No. 5.","DOI":"10.1109\/32.685258"},{"key":"key2022020820003622000_B8","doi-asserted-by":"crossref","unstructured":"Glitho, R.H. and Hayes, S. (1995), Special Issue on \u201cTelecommunications management network\u201d, IEEE Communications, Vol. 33 No. 3.","DOI":"10.1109\/35.364922"},{"key":"key2022020820003622000_B9","unstructured":"GMD FOKUS, IBM Corp. (1998), Mobile Agent Facility Specification, Joint Submission supported by Crystaliz Inc., General Magic Inc., the Open Group, OMG TC Document orbos\/97\u201010\u201005, ftp:\/\/ftp.omg.org\/docs\/ orbos\/97\u201010\u201005.pdf."},{"key":"key2022020820003622000_B10","unstructured":"Goldszmidt, G. and Yemini, Y. (1995), \u201cDistributed management by delegation\u201d, Proc. 15th International Conference on Distributed Computing Systems, IEEE Computer Society, Vancouver, British Columbia."},{"key":"key2022020820003622000_B11","unstructured":"Gosling, J., Joy, B. and Steele, G. (1996), The Java Language Specification, Addison\u2010Wesley, Manlo Park, CA."},{"key":"key2022020820003622000_B12","unstructured":"Hewlett Packard (1992), Openview User\u2019s Guide, HP."},{"key":"key2022020820003622000_B13","doi-asserted-by":"crossref","unstructured":"Huhns, M.N. and Singh, M.P. (1997), Special Issue on \u201cInternet\u2010based agents: applications and infrastructure\u201d, IEEE Internet Computing, Vol. 1 No. 4.","DOI":"10.1109\/MIC.1997.612208"},{"key":"key2022020820003622000_B14","unstructured":"IAIK (1998), iSaSiLk 2.0, http:\/\/jcewww.iaik.tu\u2010graz.ac.at\/iSaSiLk\/."},{"key":"key2022020820003622000_B15","unstructured":"IBM (1997), NETView, http:\/\/www.networking.ibm.com\/netprod.html."},{"key":"key2022020820003622000_B16","doi-asserted-by":"crossref","unstructured":"Inoue, Y., Guha, D. and Berndt, H. (1998), \u201cThe TINA consortium\u201d, IEEE Communications, Vol. 36 No. 10.","DOI":"10.1109\/35.714634"},{"key":"key2022020820003622000_B17","unstructured":"Lange, D.B. and Aridor, Y. (1997), Agent Transfer Protocol\u2010ATP\/0.1, IBM Tokyo Research Labs, http:\/\/www.trl.ibm.co.jp\/aglets\/atp\/atp.html."},{"key":"key2022020820003622000_B18","doi-asserted-by":"crossref","unstructured":"Leppinen, M. et al. (1997), \u201cJava\u2010 and CORBA\u2010based network management\u201d, IEEE Computer, Vol. 30 No. 6, pp. 83\u20107.","DOI":"10.1109\/2.587555"},{"key":"key2022020820003622000_B19","unstructured":"Lupu, E. and Sloman, M. (1997), \u201cA policy based role object model\u201d, Proc. EDOC\u201997, IEEE Computer Society Press."},{"key":"key2022020820003622000_B20","unstructured":"Object Management Group \u2013 OMG (1995), The Common Object Request Broker: Architecture and Specification, Rev 2.0, OMG Document 96\u201003\u201004."},{"key":"key2022020820003622000_B21","unstructured":"Peine, H. (1997), \u201cAn introduction to mobile agent programming and the Ara system\u201d, ZRI\u2010Report 1\/97, Dept. Of Computer Science, University of Kaiserslautern, Germany."},{"key":"key2022020820003622000_B22","doi-asserted-by":"crossref","unstructured":"Rothermel, K. and Popescu\u2010Zeletin, R. (1997), Proc. 1st International Workshop on Mobile Agents, Berlin (D), Lecture Notes in Computer Science, No. 1219, Springer\u2010Verlag, Berlin.","DOI":"10.1007\/3-540-62803-7"},{"key":"key2022020820003622000_B23","doi-asserted-by":"crossref","unstructured":"Stamos, J.W. and Gifford, D.K. (1990), \u201cRemote evaluation\u201d, ACM Transaction on Programming Languages and Systems, Vol. 12 No. 4.","DOI":"10.1145\/88616.88631"},{"key":"key2022020820003622000_B24","unstructured":"SUN Microsystems (1999), Java Development Kit \u2010 Version 1.2, http:\/\/java.sun.com\/products\/."},{"key":"key2022020820003622000_B25","unstructured":"SUNSOFT (1994), Sun NetManager, Reference Manual, SunSoft Press."},{"key":"key2022020820003622000_B26","unstructured":"Systemics (1997), Cryptix, http:\/\/www.systemics.com\/software\/cryptix\u2010java\/."},{"key":"key2022020820003622000_B27","unstructured":"TIVOLI (1997), http:\/\/www.tivoli.com\/."},{"key":"key2022020820003622000_B28","doi-asserted-by":"crossref","unstructured":"Vitek, J. and Tschudin, C. (1997), Mobile Object Systems Towards the Programmable Internet, Lecture Notes in Computer Science, No. 1222, Springer\u2010Verlag, Berlin.","DOI":"10.1007\/3-540-62852-5"},{"key":"key2022020820003622000_B29","unstructured":"Wall, L. and Schwartz, R. (1990), Programming Perl, O\u2019Reilly."},{"key":"key2022020820003622000_B30","unstructured":"Welch, B. (1997), Practical Programming in Tcl and Tk, Prentice\u2010Hall, Englewood Cliffs, NJ."},{"key":"key2022020820003622000_B31","unstructured":"Yemini, Y. and da Silva, S. (1996), \u201cTowards programmable networks\u201d, IFIP\/IEEE International Workshop on Distributed Systems: Operations and Management, L\u2019Aquila, Italy."}],"container-title":["Internet Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662249910297769\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662249910297769\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:41:02Z","timestamp":1753400462000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/intr\/article\/9\/5\/360-371\/178009"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,12,1]]},"references-count":31,"journal-issue":{"issue":"5","published-print":{"date-parts":[[1999,12,1]]}},"alternative-id":["10.1108\/10662249910297769"],"URL":"https:\/\/doi.org\/10.1108\/10662249910297769","relation":{},"ISSN":["1066-2243"],"issn-type":[{"type":"print","value":"1066-2243"}],"subject":[],"published":{"date-parts":[[1999,12,1]]}}}