{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:11:35Z","timestamp":1729663895651,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/cmpsac.2003.1245418","type":"proceedings-article","created":{"date-parts":[[2004,3,2]],"date-time":"2004-03-02T02:26:50Z","timestamp":1078194410000},"page":"690-695","source":"Crossref","is-referenced-by-count":0,"title":["PeAgent - a mobile agent system to support secure Internet and Web applications"],"prefix":"10.1109","author":[{"family":"Qingkai Ma","sequence":"first","affiliation":[]},{"family":"Wei Hao","sequence":"additional","affiliation":[]},{"family":"Wei Li","sequence":"additional","affiliation":[]},{"family":"Manghui Tu","sequence":"additional","affiliation":[]},{"family":"I-Ling yen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","article-title":"A taxonomy of obfuscating transformations","volume":"148","author":"collberg","year":"1997","journal-title":"Technical Report"},{"year":"0","key":"2"},{"year":"0","key":"10"},{"year":"0","key":"1"},{"key":"7","article-title":"Secure and survivable agent computation","volume":"utd cs 17 2","author":"ma","year":"2002","journal-title":"Technical Report"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1002\/spe.364"},{"key":"5","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1007\/3-540-68671-1_9","article-title":"D'Agents: Security in a multiple-language","author":"gray","year":"1998","journal-title":"Mobile Agents and Security"},{"key":"4","article-title":"An approach to solve the problem of malicious hosts","author":"hohl","year":"1997","journal-title":"Technical Report"},{"key":"9","article-title":"Design and development of a practical security model for a mobile agent system","volume":"46","author":"pulianfito","year":"2000","journal-title":"Journal of System Architecture"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/504450.504472"},{"key":"11","article-title":"Security and reliability in concordia","author":"walsh","year":"1998","journal-title":"Proceedings of the 30th Annual Hawaii International Conference on System Sciences"},{"journal-title":"A Technical Approach to Privacy Based on Mobile Agents Protected by Tamper-Resistant Hardware","year":"1999","author":"wilhem","key":"12"}],"event":{"name":"27th Annual International Computer Software and Applications Conference","acronym":"CMPSAC-03","location":"Dallas, TX, USA"},"container-title":["Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8813\/27898\/01245418.pdf?arnumber=1245418","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T04:05:45Z","timestamp":1497585945000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1245418\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/cmpsac.2003.1245418","relation":{},"subject":[]}}