{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T18:30:23Z","timestamp":1730226623170,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/iat.2004.1342942","type":"proceedings-article","created":{"date-parts":[[2004,11,8]],"date-time":"2004-11-08T11:28:24Z","timestamp":1099913304000},"page":"183-189","source":"Crossref","is-referenced-by-count":0,"title":["Countering agent security vulnerabilities using an extended SENSE schema"],"prefix":"10.1109","author":[{"given":"J.","family":"Page","sequence":"first","affiliation":[]},{"given":"A.","family":"Zaslavsky","sequence":"additional","affiliation":[]},{"given":"M.","family":"Indrawan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Tryllian Agent Development Kit (ADK) 2 1","year":"0","key":"3"},{"journal-title":"Grasshopper Release 2 2 Basics and Concepts Revision1 0","first-page":"70","year":"0","key":"2"},{"key":"10","first-page":"17","article-title":"A buddy model of security for mobile agent communities operating in pervasive scenarios","volume":"32","author":"page","year":"2004","journal-title":"Proc Second Australasian Information Security Workshop(AISW2004)"},{"journal-title":"The Java Language Environment A White Paper","year":"1996","author":"gosling","key":"1"},{"key":"7","article-title":"Countering security vulnerabilities in agent execution using a self executing security examination","author":"page","year":"0","journal-title":"AAMAS"},{"key":"6","article-title":"Evaluating security in software agent systems using a security analysis tool","author":"page","year":"2003","journal-title":"2nd Australian Information Security Management Conference"},{"key":"5","article-title":"Mobile agent security - Issues and directions","author":"schelderup","year":"1999","journal-title":"Proceedings of the 6th International Conference on Intelligence and Services in Networks IS&N'99"},{"journal-title":"Mobile Agent Security","year":"1999","author":"jansen","key":"4"},{"key":"9","article-title":"Countermeasures for mobile agent security","author":"jansen","year":"2000","journal-title":"Computer Communications Special Issue on Advances in Research and Application of Network Security"},{"journal-title":"Software Agents","year":"1997","author":"bradshaw","key":"8"},{"key":"11","article-title":"Countering security vulnerabilities using a shared security buddy model schema in mobile agent communities","author":"page","year":"2004","journal-title":"1st International Workshop on Safety and Security in Multi-Agent Systems"}],"event":{"name":"Proceedings. IEEE\/WIC\/ACM International Conference on Intelligent Agent Technology, 2004. (IAT 2004).","location":"Beijing, China"},"container-title":["Proceedings. IEEE\/WIC\/ACM International Conference on Intelligent Agent Technology, 2004. (IAT 2004)."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9301\/29567\/01342942.pdf?arnumber=1342942","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T12:19:53Z","timestamp":1489493993000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1342942\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/iat.2004.1342942","relation":{},"subject":[]}}