{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T02:56:51Z","timestamp":1725505011981},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icdcsw.2003.1203601","type":"proceedings-article","created":{"date-parts":[[2004,6,22]],"date-time":"2004-06-22T16:27:43Z","timestamp":1087921663000},"page":"493-497","source":"Crossref","is-referenced-by-count":1,"title":["Privilege delegation and agent-oriented access control in naplet"],"prefix":"10.1109","author":[{"family":"Cheng-Zhong Xu","sequence":"first","affiliation":[]},{"family":"Song Fu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/295685.295717"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-62803-7_26"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/2.330076"},{"key":"ref13","article-title":"Naplet: A flexible mobile agent framework for network-centric applications","author":"xu","year":"2002","journal-title":"Proc of the Second Workshop on Internet Computing and e-Commerce (ICEC'02)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/1096-9128(200007)12:8<705::AID-CPE506>3.0.CO;2-X"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1007\/3-540-68671-1_9","article-title":"D'Agents: Security in a multi-language, mobile agent system","author":"gray","year":"1998","journal-title":"Mobile Agents and Security"},{"article-title":"Inside Java 2 Platform Security","year":"1999","author":"gong","key":"ref3"},{"journal-title":"Programming and Deploying Java Mobile Agents with Aglets","year":"1998","author":"lange","key":"ref6"},{"key":"ref5","article-title":"A framework for network management using mobile agents","author":"kuna","year":"2001","journal-title":"Proceedings of the First Workshop on Internet Computing and E-Commerce (ICEC'Ol)"},{"year":"0","key":"ref8","article-title":"Objectspace voyager core technology"},{"key":"ref7","article-title":"MAIL: A mobile agent itinerary language and its operational semantics","author":"lu","year":"2002","journal-title":"Technical Report Cluster and Internet Computing Lab"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/32.685258"},{"key":"ref1","article-title":"Role-based access control (RBAC): Features and motivations","author":"ferraiolo","year":"1995","journal-title":"Proc of the 11th Computer Security and Application Conf"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/spe.364"}],"event":{"name":"23rd International Conference on Distributed Computing Systems Workshops, 2003.","location":"Providence, Rhode Island, USA"},"container-title":["23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8560\/27094\/01203601.pdf?arnumber=1203601","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T04:15:33Z","timestamp":1497586533000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1203601\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/icdcsw.2003.1203601","relation":{},"subject":[]}}