{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:02Z","timestamp":1750221242564,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,25]],"date-time":"2018-06-25T00:00:00Z","timestamp":1529884800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,25]]},"DOI":"10.1145\/3227609.3227682","type":"proceedings-article","created":{"date-parts":[[2018,7,6]],"date-time":"2018-07-06T19:30:44Z","timestamp":1530905444000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Introducing Public-Key infrastructure for SiebogJS JavaScript-based Agent Middleware"],"prefix":"10.1145","author":[{"given":"Marko","family":"H\u00f6lbl","sequence":"first","affiliation":[{"name":"University of Maribor, Maribor, Slovenia"}]},{"given":"Luka","family":"Hrgarek","sequence":"additional","affiliation":[{"name":"University of Maribor, Maribor, Slovenia"}]},{"given":"Mirjana","family":"Ivanovi\u0107","sequence":"additional","affiliation":[{"name":"University of Novi Sad, Novi Sad, Serbia"}]},{"given":"Tatjana","family":"Welzer","sequence":"additional","affiliation":[{"name":"University of Maribor, Maribor, Slovenia"}]},{"given":"Milan","family":"Vidakovi\u0107","sequence":"additional","affiliation":[{"name":"University of Novi Sad, Novi Sad, Serbia"}]}],"member":"320","published-online":{"date-parts":[[2018,6,25]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2018. CAcert.org. (2018). http:\/\/www.cacert.org\/ {Accessed 22\/02\/2018}.  2018. CAcert.org. (2018). http:\/\/www.cacert.org\/ {Accessed 22\/02\/2018}."},{"key":"e_1_3_2_1_2_1","volume-title":"https:\/\/letsencrypt.org\/ {Accessed 22\/02\/2018}","author":"Encrypt Let's","year":"2018","unstructured":"2018. Let's Encrypt . ( 2018 ). https:\/\/letsencrypt.org\/ {Accessed 22\/02\/2018} . 2018. Let's Encrypt. (2018). https:\/\/letsencrypt.org\/ {Accessed 22\/02\/2018}."},{"volume-title":"node-forge. (feb","year":"2018","key":"e_1_3_2_1_3_1","unstructured":"2018. node-forge. (feb 2018 ). https:\/\/www.npmjs.com\/package\/node-forge {Accessed 23\/02\/2018}. 2018. node-forge. (feb 2018). https:\/\/www.npmjs.com\/package\/node-forge {Accessed 23\/02\/2018}."},{"volume-title":"pem. (feb","year":"2018","key":"e_1_3_2_1_4_1","unstructured":"2018. pem. (feb 2018 ). https:\/\/www.npmjs.com\/package\/pem {Accessed 23\/02\/2018}. 2018. pem. (feb 2018). https:\/\/www.npmjs.com\/package\/pem {Accessed 23\/02\/2018}."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420952"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-012-9343-1"},{"volume-title":"Introduction to Public Key Infrastructures","author":"Buchmann Johannes A.","key":"e_1_3_2_1_7_1","unstructured":"Johannes A. Buchmann , Evangelos Karatsiolis , and Alexander Wiesmaier . 2013. Introduction to Public Key Infrastructures . Springer Publishing Company, Inc orporated. Johannes A. Buchmann, Evangelos Karatsiolis, and Alexander Wiesmaier. 2013. Introduction to Public Key Infrastructures. Springer Publishing Company, Incorporated."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"D. Cooper S. Santesson S. Farrell S. Boeyen R. Housley and Polk W. 2008. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. Technical Report. https:\/\/www.ietf.org\/rfc\/rfc5280.txt  D. Cooper S. Santesson S. Farrell S. Boeyen R. Housley and Polk W. 2008. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. Technical Report. https:\/\/www.ietf.org\/rfc\/rfc5280.txt","DOI":"10.17487\/rfc5280"},{"key":"e_1_3_2_1_10_1","volume-title":"Knowledge-Based and Intelligent Information & Engineering Systems 19th Annual Conference, KES-2015, Singapore, September 2015 Proceedings.","author":"Hedin Yaqin","year":"2015","unstructured":"Yaqin Hedin and Esmiralda Moradian . 2015 . Security in Multi-Agent Systems. Procedia Computer Science 60 (2015), 1604--1612 . Knowledge-Based and Intelligent Information & Engineering Systems 19th Annual Conference, KES-2015, Singapore, September 2015 Proceedings. Yaqin Hedin and Esmiralda Moradian. 2015. Security in Multi-Agent Systems. Procedia Computer Science 60 (2015), 1604--1612. Knowledge-Based and Intelligent Information & Engineering Systems 19th Annual Conference, KES-2015, Singapore, September 2015 Proceedings."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:AGNT.0000038027.29035.7c"},{"volume-title":"Proceedings of the 7 th International Conference on Information Science and Technology (ICIST). 261--265","author":"Lukic A.","key":"e_1_3_2_1_12_1","unstructured":"A. Lukic , N. Luburic , M. Vidakovic , and M. H\u00f6lbl . 2017. Development of multiagent framework and Java Script . In Proceedings of the 7 th International Conference on Information Science and Technology (ICIST). 261--265 . A. Lukic, N. Luburic, M. Vidakovic, and M. H\u00f6lbl. 2017. Development of multiagent framework and Java Script. In Proceedings of the 7 th International Conference on Information Science and Technology (ICIST). 261--265."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/PDCAT.2007.53"},{"key":"e_1_3_2_1_14_1","volume-title":"Information Systems and Technologies (CISTI), 2011 6th Iberian Conference on. IEEE, 1--6.","author":"Marques F\u00e1bio","year":"2011","unstructured":"F\u00e1bio Marques , Gon\u00e7alo Paiva Dias , and Andr\u00e9 Z\u00faquete . 2011 . A general interoperability architecture for e-government based on agents and web services . In Information Systems and Technologies (CISTI), 2011 6th Iberian Conference on. IEEE, 1--6. F\u00e1bio Marques, Gon\u00e7alo Paiva Dias, and Andr\u00e9 Z\u00faquete. 2011. A general interoperability architecture for e-government based on agents and web services. In Information Systems and Technologies (CISTI), 2011 6th Iberian Conference on. IEEE, 1--6."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2016.03.017"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/RCIS.2009.5089289"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1533057.1533067"},{"volume-title":"Security and Trust in Agent-Oriented Middleware BT - On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops","author":"Poggi Agostino","key":"e_1_3_2_1_18_1","unstructured":"Agostino Poggi , Michele Tomaiuolo , and Giosu\u00e8 Vitaglione . 2003. Security and Trust in Agent-Oriented Middleware BT - On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops , Robert Meersman and Zahir Tari (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg , 989--1003. Agostino Poggi, Michele Tomaiuolo, and Giosu\u00e8 Vitaglione. 2003. Security and Trust in Agent-Oriented Middleware BT - On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, Robert Meersman and Zahir Tari (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 989--1003."},{"key":"e_1_3_2_1_19_1","unstructured":"Ivan Risti\u0107. 2015. Bulletproof SSL and TLS. Feisty Duck. 516 pages. arXiv:arXiv:1011.1669v3 https:\/\/www.feistyduck.com\/books\/bulletproof-ssl-and-tls\/reviewerKit.html  Ivan Risti\u0107. 2015. Bulletproof SSL and TLS. Feisty Duck. 516 pages. arXiv:arXiv:1011.1669v3 https:\/\/www.feistyduck.com\/books\/bulletproof-ssl-and-tls\/reviewerKit.html"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"S. Santesson M. Myers R. Ankney A. Malpani S. Galperin and C. Adams. 2013. X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP. (2013).  S. Santesson M. Myers R. Ankney A. Malpani S. Galperin and C. Adams. 2013. X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP. (2013).","DOI":"10.17487\/rfc6960"},{"key":"e_1_3_2_1_21_1","volume-title":"Cryptography and Network Security: Principles and Practice","author":"Stallings William","unstructured":"William Stallings . 2013. Cryptography and Network Security: Principles and Practice ( 6 th ed.). Prentice Hall Press , Upper Saddle River, NJ, USA. William Stallings. 2013. Cryptography and Network Security: Principles and Practice (6th ed.). Prentice Hall Press, Upper Saddle River, NJ, USA.","edition":"6"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIAS.2006.295419"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2010.145"},{"key":"e_1_3_2_1_24_1","article-title":"Study of Existing Security Enhancement for Software Agent","volume":"1","author":"Upadhye Sachin","year":"2013","unstructured":"Sachin Upadhye and PG Khot . 2013 . Study of Existing Security Enhancement for Software Agent . International Journal 1 , 7 (2013). Sachin Upadhye and PG Khot. 2013. Study of Existing Security Enhancement for Software Agent. International Journal 1, 7 (2013).","journal-title":"International Journal"},{"key":"e_1_3_2_1_25_1","unstructured":"M. Vidakovi\u0107 G. Sladi\u0107 and Z. Konjovi\u0107. 2003. Security Management in J2EE based Intelligent Agent Framework. In Proceeding (397) Software Engineering and Applications -2003. ACTA Press 062. http:\/\/www.actapress.com\/PaperInfo.aspx?PaperID=14499  M. Vidakovi\u0107 G. Sladi\u0107 and Z. Konjovi\u0107. 2003. Security Management in J2EE based Intelligent Agent Framework. In Proceeding (397) Software Engineering and Applications -2003. ACTA Press 062. http:\/\/www.actapress.com\/PaperInfo.aspx?PaperID=14499"},{"key":"e_1_3_2_1_26_1","volume-title":"Network Security with Openssl","author":"Viega Jon","unstructured":"Jon Viega , Pravir Chandra , and Matt Messier . 2002. Network Security with Openssl ( 1 st ed.). O'Reilly & Associates, Inc. , Sebastopol, CA, USA . Jon Viega, Pravir Chandra, and Matt Messier. 2002. Network Security with Openssl (1st ed.). O'Reilly & Associates, Inc., Sebastopol, CA, USA.","edition":"1"}],"event":{"name":"WIMS '18: 8th International Conference on Web Intelligence, Mining and Semantics","acronym":"WIMS '18","location":"Novi Sad Serbia"},"container-title":["Proceedings of the 8th International Conference on Web Intelligence, Mining and Semantics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3227609.3227682","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3227609.3227682","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:32Z","timestamp":1750212452000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3227609.3227682"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,25]]},"references-count":25,"alternative-id":["10.1145\/3227609.3227682","10.1145\/3227609"],"URL":"https:\/\/doi.org\/10.1145\/3227609.3227682","relation":{},"subject":[],"published":{"date-parts":[[2018,6,25]]},"assertion":[{"value":"2018-06-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}