{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:34:11Z","timestamp":1729636451956,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/tai.2003.1250209","type":"proceedings-article","created":{"date-parts":[[2004,3,2]],"date-time":"2004-03-02T02:26:50Z","timestamp":1078194410000},"page":"338-345","source":"Crossref","is-referenced-by-count":1,"title":["Efficient key assignment scheme for mobile agent systems"],"prefix":"10.1109","author":[{"family":"Wai-Meng Chew","sequence":"first","affiliation":[]},{"family":"Chi-Hung Chi","sequence":"additional","affiliation":[]},{"family":"Tie-Yan Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1007\/10718964_24","article-title":"Secure Transactions with Mobile Agent in Hostile Environments","volume":"1841","author":"kotazanikolaou","year":"2000","journal-title":"LNCS-Information Security and Privacy"},{"journal-title":"Programming and Deploying Java Mobile Agents with Aglets","year":"1998","author":"lange","key":"ref11"},{"key":"ref12","article-title":"Defending Against Distributed Denial of Service Attacks Using Resistant Mobile Agent Architecture","author":"li","year":"2002","journal-title":"Proceedings of IEEE IPDPS 02 Workshop on Internet Computing and E-Commerce"},{"key":"ref13","article-title":"Wrapper Based Security Monitoring Framework in Mobile Agent System","volume":"12","author":"liu","year":"2001","journal-title":"Journal of Software"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/S0141-9331(01)00102-8"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1007\/3-540-68671-1_4","article-title":"Protecting Mobile Agents Against Malicious Hosts","volume":"1419","author":"sander","year":"1998","journal-title":"Mobile Agents and Security LNCS"},{"journal-title":"Applied Cryptography","year":"1996","author":"schneier","key":"ref16"},{"key":"ref17","first-page":"77","article-title":"A Coordination Model for Secure Collaboration","author":"tripathi","year":"2001","journal-title":"Proceedings of Workshop on Internet Process Coordination and Ubiquitous Computing"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISADS.2003.1193943"},{"key":"ref19","article-title":"A Security Architecture for Mobile Agents in Ajanta","author":"tripathi","year":"2000","journal-title":"Proceedings of the International Conference on Distributed Computing Systems"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/FTDCS.1999.818777"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35565-8_14"},{"key":"ref6","first-page":"118","article-title":"Security for Mobile Agents: Authentication and State Appraisal","volume":"1146","author":"farmer","year":"1996","journal-title":"LNCS-Research in Computer Society"},{"key":"ref5","article-title":"Active Defense of a Computer System using Autonomous Agents","author":"crosbie","year":"1995","journal-title":"Technical Report CSD-TR-95&#x2013;008"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/IT.1998.713396"},{"key":"ref7","article-title":"Mobile Agents: Are they a good idea?","author":"harrison","year":"0","journal-title":"Tech Rep IBM Research Report"},{"key":"ref2","first-page":"961","article-title":"Protection and Interoperability for Mobile Agents: a Secure and Open Programming Environment","volume":"e83 b","author":"bellavista","year":"2000","journal-title":"IEICE Transactions on Communications Special Issue on &#x201C;Autonomous Decentralized Systems"},{"key":"ref1","first-page":"323","article-title":"An Open Secure Mobile Agent Framework for Systems Management","volume":"7","author":"bellavista","year":"1999","journal-title":"Journal of Network and Systems Management (JNSM) Special Issue on Mobile Agent-based Network and Service Management"},{"key":"ref9","article-title":"Security in the Ajanta Mobile Agent System","author":"kamik","year":"2001","journal-title":"Software-Practice and Experience"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1016\/S0097-8493(98)00035-1","article-title":"Access Control and Key Management for Mobile Agents","volume":"22","author":"volker","year":"1998","journal-title":"Computer and Graphics"}],"event":{"name":"15th IEEE International Conference on Tools with Artificial Intelligence","acronym":"TAI-03","location":"Sacramento, CA, USA"},"container-title":["Proceedings. 15th IEEE International Conference on Tools with Artificial Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8840\/27974\/01250209.pdf?arnumber=1250209","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T04:05:50Z","timestamp":1497585950000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1250209\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/tai.2003.1250209","relation":{},"subject":[]}}