{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T22:49:06Z","timestamp":1743029346950,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540647928"},{"type":"electronic","value":"9783540686712"}],"license":[{"start":{"date-parts":[[1998,1,1]],"date-time":"1998-01-01T00:00:00Z","timestamp":883612800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/3-540-68671-1_9","type":"book-chapter","created":{"date-parts":[[2007,8,1]],"date-time":"2007-08-01T02:15:31Z","timestamp":1185934531000},"page":"154-187","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":70,"title":["D\u2019Agents: Security in a Multiple-Language, Mobile-Agent System"],"prefix":"10.1007","author":[{"given":"Robert S.","family":"Gray","sequence":"first","affiliation":[]},{"given":"David","family":"Kotz","sequence":"additional","affiliation":[]},{"given":"George","family":"Cybenko","sequence":"additional","affiliation":[]},{"given":"Daniela","family":"Rus","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1998,6,18]]},"reference":[{"issue":"8","key":"9_CR1","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/2.532046","volume":"29","author":"L. F. Bic","year":"1996","unstructured":"Lubomir F. Bic, Munehiro Fukuda, and Michael B. Dillencourt. Distributed computing using autonomous objects. IEEE Computer, 29(8):55\u201361, August 1996.","journal-title":"IEEE Computer"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Jonathan Bredin, David Kotz, and Daniela Rus. Marked-based resource control for mobile agents. To appear in the conference Autonomous Agents\u2019 98, October 1997.","DOI":"10.1145\/280765.280801"},{"issue":"2","key":"9_CR3","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/6.570825","volume":"34","author":"D. Chaum","year":"1997","unstructured":"David Chaum and Stefan Brands. \u201cMinting\u201d electronic cash. IEEE Spectrum, 34(2):30\u201334, February 1997. Special issue on Technology and Electronic Economy.","journal-title":"IEEE Spectrum"},{"issue":"5","key":"9_CR4","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/98.468361","volume":"2","author":"D. Chess","year":"1995","unstructured":"David Chess, Benjamin Grosof, Colin Harrison, David Levine, Colin Parris, and Gene Tsudik. Itinerant agents for mobile computing. IEEE Personal Communications, 2(5):34\u201349, October 1995.","journal-title":"IEEE Personal Communications"},{"key":"9_CR5","unstructured":"Michael H. Coen. SodaBot: A software agent environment and construction system. In Yannis Labrou and Tim Finin, editors, Proceedings of the CIKM Workshop on Intelligent Information Agents, Third International Conference on Information and Knowledge Management (CIKM 94), Gaithersburg, Maryland, December 1994."},{"key":"9_CR6","unstructured":"Gary Cornell and Cay S. Horstmann. Core Java. Sunsoft Press (Prentice Hall), 1997."},{"issue":"10","key":"9_CR7","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1145\/262793.262811","volume":"40","author":"S. Forrest","year":"1997","unstructured":"Stephanie Forrest, Steven A. Hofmeyr, and Anil Somayaji. Computer immunology. Communications of the ACM, 40(10):88\u201396, October 1997.","journal-title":"Communications of the ACM"},{"key":"9_CR8","unstructured":"Odyssey: Beta Release 1.0, 1997. Available as part of the Odyssey package at http:\/\/www.genmagic.com\/agents\/ ."},{"key":"9_CR9","unstructured":"Robert S. Gray. Agent Tcl: A flexible and secure mobile-agent system. In Proceedings of the 1996 Tcl\/Tk Workshop, pages 9\u201323, July 1996."},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"David Halls, John Bates, and Jean Bacon. Flexible distributed programming using mobile code. In Proceedings of the Seventh ACM SIGOPS European Workshop, pages 225\u2013231, September 1996.","DOI":"10.1145\/504450.504490"},{"key":"9_CR11","series-title":"Technical Report","volume-title":"AGDB: A debugger for Agent Tcl","author":"M. Hirschl","year":"1997","unstructured":"Melissa Hirschl and David Kotz. AGDB: A debugger for Agent Tcl. Technical Report PCS-TR97-306, Dept. of Computer Science, Dartmouth College, Hanover, NH, February 1997."},{"key":"9_CR12","unstructured":"Fritz Hohl. Protecting mobile agents with blackbox security. In Proceedings of the 1997 Workshop on Mobile Agents and Security, University of Maryland, October 1997."},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Dag Johansen, Robbert van Renesse, and Fred B. Scheidner. Operating system support for mobile agents. In Proceedings of the Fifth IEEE Workshop on Hot Topics in Operating Systems (HTOS), pages 42\u201345, May 1995.","DOI":"10.1109\/HOTOS.1995.513452"},{"issue":"4","key":"9_CR14","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/4236.612220","volume":"1","author":"G. Karjoth","year":"1997","unstructured":"G\u00fcnter Karjoth, Danny B. Lange, and Mitsuru Oshima. A security model for Aglets. IEEE Internet Computing, 1(4):68\u201377, July\/August 1997.","journal-title":"IEEE Internet Computing"},{"key":"9_CR15","volume-title":"Network Security: Private Communication in a Public World","author":"C. Kaufman","year":"1995","unstructured":"Charlie Kaufman, Radia Perlman, and Mike Speciner. Network Security: Private Communication in a Public World. Prentice-Hall, New Jersey, 1995."},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Richard Kelsey and Jonathan Rees. A tractable Scheme implementation. Lisp and Symbolic Computation, 7(4), 1995.","DOI":"10.1007\/BF01018614"},{"key":"9_CR17","unstructured":"Danny B. Lange and Mitsuru Oshima. The Aglet cook-book. 1997. In progress. Selected chapters available at http:\/\/www.trl.ibm.co.jp\/aglets\/aglet-book\/index.html ."},{"key":"9_CR18","unstructured":"Jacob Y. Levy and John K. Ousterhout. Safe Tcl toolkit for electronic meeting places. In Proceedings of the First USENIX Workshop on Electronic Commerce, pages 133\u2013135, July 1995."},{"key":"9_CR19","unstructured":"Mobile Agent Facility Specification (joint submissions). Technical report, Crystaliz, General Magic, GMD FOKUS, Internal Business Machine Corporation, and The Open Group, 1997. Response to OMG\u2019s Common Facility Task Force RFP3. Draft 5 is available at http:\/\/www.genmagic.com\/agents\/MAF\/ ."},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"Yaron Minsky, Robbert van Renesse, Fred B. Schneider, and Scott D. Stoller. Cryptographic support for fault-tolerant distributed computing. In Proceedings of the Seventh ACM SIGOPS European Workshop, pages 109\u2013114, September 1996.","DOI":"10.1145\/504450.504472"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"John K. Ousterhout, Jacob Y. Levy, and Brent B. Welch. The Safe-Tcl security model. Technical report, Sun Microsystems Laboratories, 1997. In progress. Draft available at http:\/\/www.sunlabs.com\/people\/john.ousterhout\/safeTcl.html .","DOI":"10.1007\/3-540-68671-1_12"},{"key":"9_CR22","series-title":"Lect Notes Comput Sci","volume-title":"Proceedings of the First International Workshop on Mobile Agents (MA\u2019 97)","author":"H. Peine","year":"1997","unstructured":"Holger Peine and Torsten Stolpmann. The architecture of the Ara platform for mobile agents. In Proceedings of the First International Workshop on Mobile Agents (MA\u2019 97), volume 1219 of Lecture Notes in Computer Science, Berlin, April 1997. Springer-Verlag."},{"key":"9_CR23","unstructured":"Daniela Rus, Robert Gray, and David Kotz. Transportable information agents. Journal of Intelligent Information Systems, May 1997. To appear."},{"key":"9_CR24","unstructured":"Thomas Sander. On cryptographic protection of mobile agents. In Proceedings of the 1997 Workshop on Mobile Agents and Security, University of Maryland, October 1997."},{"key":"9_CR25","unstructured":"Fred B. Schneider. Security in Tacoma Too. In Proceedings of the 1997 DAGSTUHL Workshop on Mobile Agents, September 1997."},{"key":"9_CR26","doi-asserted-by":"crossref","unstructured":"Fred B. Schneider. Towards fault-tolerant and secure agentry. In Proceedings of the 11th International Workshop on Distributed Algortithms, September 1997.","DOI":"10.1007\/BFb0030670"},{"key":"9_CR27","doi-asserted-by":"crossref","unstructured":"Marvin Sirbu and J. D. Tygar. NetBill: An Internet commerce system optimized for network delivered services. In Proceedings of 40th IEEE Computer Society International Conference (COMPCON 95). IEEE Computer Society Press, March 1995.","DOI":"10.1109\/98.403456"},{"key":"9_CR28","unstructured":"Joseph Tardo and Luis Valente. Mobile agent security and Telescript. In Proceedings of the 41th International Conference of the IEEE Computer Society (Comp-Con\u2019 96), February 1996."},{"key":"9_CR29","unstructured":"Voyager technical overview. ObjectSpace White Paper, ObjectSpace, 1997."},{"key":"9_CR30","volume-title":"Agents Unleashed: A public domain look at agent technology","author":"P. Wayner","year":"1995","unstructured":"Peter Wayner. Agents Unleashed: A public domain look at agent technology. AP Professional, Chestnut Hill, Massachusetts, 1995."},{"key":"9_CR31","unstructured":"James E. White. Telescript technology: The foundation for the electronic marketplace. General Magic White Paper, General Magic, Inc., 1994."},{"key":"9_CR32","unstructured":"James E. White. Telescript technology: An introduction to the language. General Magic White Paper, General Magic, 1995."},{"key":"9_CR33","unstructured":"James E. White. Telescript technology: Scenes from the electronic marketplace. General Magic White Paper, General Magic, 1995."},{"key":"9_CR34","unstructured":"James E. White. Telescript technology: Mobile agents. 1996."},{"key":"9_CR35","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0022715","volume-title":"Proceedings of the First International Workshop on Mobile Agents (MA\u2019 97)","author":"D. Wong","year":"1997","unstructured":"D. Wong, N. Paciorek, T. Walsh, J. DiCelie, M. Young, and B. Peet. Concordia: An infrastructure for collaborating mobile agents. In Proceedings of the First International Workshop on Mobile Agents (MA\u2019 97), volume 1219 of Lecture Notes in Computer Science, Berlin, April 1997. Springer-Verlag."}],"container-title":["Lecture Notes in Computer Science","Mobile Agents and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-68671-1_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T01:38:03Z","timestamp":1737337083000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-68671-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540647928","9783540686712"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/3-540-68671-1_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]},"assertion":[{"value":"18 June 1998","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}