{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T12:02:35Z","timestamp":1648641755937},"reference-count":42,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2001,1,1]],"date-time":"2001-01-01T00:00:00Z","timestamp":978307200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2001,1]]},"DOI":"10.1016\/s1389-1286(00)00148-1","type":"journal-article","created":{"date-parts":[[2003,4,7]],"date-time":"2003-04-07T17:19:33Z","timestamp":1049735973000},"page":"39-56","source":"Crossref","is-referenced-by-count":3,"title":["Secure Internet management by delegation"],"prefix":"10.1016","volume":"35","author":[{"given":"J\u00fcrgen","family":"Sch\u00f6nw\u00e4lder","sequence":"first","affiliation":[]},{"given":"J\u00fcrgen","family":"Quittek","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S1389-1286(00)00148-1_BIB1","unstructured":"Y. Yemini, G. Goldszmidt, S. Yemini, Network management by delegation, in: Proceedings of the International Symposium on Integrated Network Management, April 1991, pp. 95\u2013107"},{"key":"10.1016\/S1389-1286(00)00148-1_BIB2","doi-asserted-by":"crossref","unstructured":"M.R. Siegl, G. Trausmuth, Hierarchical network management \u2013 A concept and its prototype in SNMPv2, in: Proceedings of the Sixth Joint European Networking Conference, Tel Aviv, Israel, May 1995","DOI":"10.1016\/0169-7552(95)00075-5"},{"key":"10.1016\/S1389-1286(00)00148-1_BIB3","doi-asserted-by":"crossref","unstructured":"A. Vassila, G. Pavlou, G. Knight, Active objects in TMN, in: Proceedings of the Fifth IFIP\/IEEE International Symposium on Integrated Network Management, May 1997, pp. 139\u2013150","DOI":"10.1007\/978-0-387-35180-3_11"},{"key":"10.1016\/S1389-1286(00)00148-1_BIB4","doi-asserted-by":"crossref","unstructured":"P. Kalyanasundaram, A.S. Sethi, C.M. Sherwin, D. Zhu, A spreadsheet-based scripting environment for SNMP, in: Proceedings of the Fifth IFIP\/IEEE International Symposium on Integrated Network Management, May 1997, pp. 752\u2013765","DOI":"10.1007\/978-0-387-35180-3_56"},{"issue":"3","key":"10.1016\/S1389-1286(00)00148-1_BIB5","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1145\/263932.263940","article-title":"Decentralized approaches for network management","volume":"27","author":"Kahani","year":"1997","journal-title":"Computer Communication Review"},{"key":"10.1016\/S1389-1286(00)00148-1_BIB6","doi-asserted-by":"crossref","unstructured":"G. Goldszmidt, Y. Yemini, Delegated agents for network management, IEEE Communications Magazine 36 (3) (1998) 66\u201370","DOI":"10.1109\/35.663329"},{"key":"10.1016\/S1389-1286(00)00148-1_BIB7","doi-asserted-by":"crossref","unstructured":"M. Feridun, W. Kasteleijn, J. Krause, Distributed management with mobile components, in: Proceedings of the Sixth IFIP\/IEEE International Symposium on Integrated Network Management, Boston, May 1999, pp. 857\u2013870","DOI":"10.1109\/INM.1999.770727"},{"key":"10.1016\/S1389-1286(00)00148-1_BIB8","unstructured":"ISO, Information Technology \u2013 Open Systems Interconnection \u2013 Systems Management \u2013 Command Sequencer, International Standard ISO 10164-21, ISO, 1998"},{"key":"10.1016\/S1389-1286(00)00148-1_BIB9","doi-asserted-by":"crossref","unstructured":"D. Levi, J. Sch\u00f6nw\u00e4lder, Definitions of managed objects for the delegation of management scripts, RFC 2592, Nortel Networks, TU Braunschweig, May 1999","DOI":"10.17487\/rfc2592"},{"issue":"15","key":"10.1016\/S1389-1286(00)00148-1_BIB10","doi-asserted-by":"crossref","first-page":"1843","DOI":"10.1016\/S0169-7552(97)00099-8","article-title":"Network management by delegation \u2013 From research prototypes towards standards","volume":"29","author":"Sch\u00f6nw\u00e4lder","year":"1997","journal-title":"Computer Networks and ISDN Systems"},{"issue":"4","key":"10.1016\/S1389-1286(00)00148-1_BIB11","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1109\/35.833567","article-title":"Active distributed management for IP networks","volume":"38","author":"Kawamura","year":"2000","journal-title":"IEEE Communications Magazine"},{"issue":"1","key":"10.1016\/S1389-1286(00)00148-1_BIB12","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/35.568214","article-title":"A survey of active network research","volume":"35","author":"Tennenhouse","year":"1997","journal-title":"IEEE Communications Magazine"},{"issue":"10","key":"10.1016\/S1389-1286(00)00148-1_BIB13","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/35.722139","article-title":"Directions in active networks","volume":"36","author":"Calvert","year":"1998","journal-title":"IEEE Communications Magazine"},{"issue":"10","key":"10.1016\/S1389-1286(00)00148-1_BIB14","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/35.722138","article-title":"The IEEE P1520 standards initiative for programmable network interfaces","volume":"36","author":"Biswas","year":"1998","journal-title":"IEEE Communications Magazine"},{"issue":"3","key":"10.1016\/S1389-1286(00)00148-1_BIB15","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1109\/35.825653","article-title":"A programmable router architecture supporting control plane extensibility","volume":"38","author":"Gao","year":"2000","journal-title":"IEEE Communications Magazine"},{"issue":"1","key":"10.1016\/S1389-1286(00)00148-1_BIB16","doi-asserted-by":"crossref","DOI":"10.1109\/COMST.1998.5340400","article-title":"Mobile agents for network management","volume":"1","author":"Bieszczad","year":"1998","journal-title":"IEEE Communications Surveys"},{"key":"10.1016\/S1389-1286(00)00148-1_BIB17","doi-asserted-by":"crossref","unstructured":"S. Albayrak, F.J. Garij (Eds.), Intelligent Agents for Telecommunication Applications (IATA'98), Lecture Notes in Artificial Intelligence, vol. 1437, Springer, Berlin, July 1998","DOI":"10.1007\/BFb0053939"},{"key":"10.1016\/S1389-1286(00)00148-1_BIB18","doi-asserted-by":"crossref","unstructured":"A. Karmouch, Mobile software agents for telecommunications, IEEE Communications Magazine 36 (7) (1998)","DOI":"10.1109\/MCOM.1998.689627"},{"key":"10.1016\/S1389-1286(00)00148-1_BIB19","doi-asserted-by":"crossref","unstructured":"T. Magedanz, R. Glitho, Mobile agent-based network and service management, Journal of Network and Systems Management 7 (3) (1999)","DOI":"10.1023\/A:1018719328075"},{"key":"10.1016\/S1389-1286(00)00148-1_BIB20","doi-asserted-by":"crossref","unstructured":"G. Vigna (Ed.), Mobile Agents and Security, Springer, Berlin, 1998","DOI":"10.1007\/3-540-68671-1"},{"issue":"1","key":"10.1016\/S1389-1286(00)00148-1_BIB21","doi-asserted-by":"crossref","DOI":"10.1109\/COMST.1999.5340509","article-title":"Active networks: applications security, safety and architectures","volume":"2","author":"Psounis","year":"1999","journal-title":"IEEE Communications Surveys"},{"issue":"3","key":"10.1016\/S1389-1286(00)00148-1_BIB22","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1109\/65.690960","article-title":"A secure active network environment architecture: realization in switchware","volume":"12","author":"Alexander","year":"1998","journal-title":"IEEE Network Magazine"},{"issue":"10","key":"10.1016\/S1389-1286(00)00148-1_BIB23","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1109\/35.722141","article-title":"Safety and security of programmable network infrastructures","volume":"36","author":"Alexander","year":"1998","journal-title":"IEEE Communications Magazine"},{"issue":"4","key":"10.1016\/S1389-1286(00)00148-1_BIB24","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1109\/35.833566","article-title":"Secure quality of service handling: SQoSH","volume":"38","author":"Alexander","year":"2000","journal-title":"IEEE Communications Magazine"},{"key":"10.1016\/S1389-1286(00)00148-1_BIB25","series-title":"The Java Virtual Machine Specification","author":"Lindholm","year":"1997"},{"key":"10.1016\/S1389-1286(00)00148-1_BIB26","unstructured":"A. Pras, J. Sch\u00f6nw\u00e4lder (Eds.), Distributed Management (special issue), Simple Times 7 (2) (1999)"},{"issue":"5","key":"10.1016\/S1389-1286(00)00148-1_BIB27","doi-asserted-by":"crossref","DOI":"10.1109\/49.842986","article-title":"Building distributed management applications with the IETF Script MIB","volume":"18","author":"Sch\u00f6nw\u00e4lder","year":"2000","journal-title":"IEEE Journal on Selected Areas of Communications"},{"key":"10.1016\/S1389-1286(00)00148-1_BIB28","doi-asserted-by":"crossref","unstructured":"D. Harrington, R. Presuhn, B. Wijnen, An architecture for describing SNMP management frameworks, RFC 2571, Cabletron Systems, BMC Software, IBM T.J. Watson Research, April 1999","DOI":"10.17487\/rfc2571"},{"key":"10.1016\/S1389-1286(00)00148-1_BIB29","doi-asserted-by":"crossref","unstructured":"J. Case, D. Harrington, R. Presuhn, B. Wijnen, Message processing and dispatching for the simple network management protocol (SNMP), RFC 2572, SNMP Research, Cabletron Systems, BMC Software, IBM T.J. Watson Research, April 1999","DOI":"10.17487\/rfc2572"},{"key":"10.1016\/S1389-1286(00)00148-1_BIB30","doi-asserted-by":"crossref","unstructured":"D. Levi, P. Meyer, B. Stewart, SNMP applications, RFC 2573, SNMP Research, Secure Computing Corporation, Cisco Systems, April 1999","DOI":"10.17487\/rfc2573"},{"key":"10.1016\/S1389-1286(00)00148-1_BIB31","doi-asserted-by":"crossref","unstructured":"U. Blumenthal, B. Wijnen, User-based security model (USM) for version 3 of the simple network management protocol (SNMPv3), RFC 2574, IBM T.J. Watson Research, April 1999","DOI":"10.17487\/rfc2574"},{"key":"10.1016\/S1389-1286(00)00148-1_BIB32","doi-asserted-by":"crossref","unstructured":"B. Wijnen, R. Presuhn, K. McCloghrie, View-based access control model (VACM) for the simple network management protocol (SNMP), RFC 2575, IBM T.J. Watson Research, BMC Software, Cisco Systems, April 1999","DOI":"10.17487\/rfc2575"},{"issue":"4","key":"10.1016\/S1389-1286(00)00148-1_BIB33","article-title":"Key derivation for network management applications","volume":"11","author":"Blumenthal","year":"1997","journal-title":"IEEE Network Magazine"},{"key":"10.1016\/S1389-1286(00)00148-1_BIB34","unstructured":"NBS, Data Encryption Standard, Federal Information Processing Standard 46, National Bureau of Standards, January 1988"},{"key":"10.1016\/S1389-1286(00)00148-1_BIB35","doi-asserted-by":"crossref","unstructured":"M.St. Johns, Diffie-Helman USM key management information base and textual convention, RFC 2786, Excite@Home, March 2000","DOI":"10.17487\/rfc2786"},{"key":"10.1016\/S1389-1286(00)00148-1_BIB36","doi-asserted-by":"crossref","unstructured":"M. Daniele, B. Wijnen, M. Ellison, D. Francisco, Agent extensibility (AgentX) protocol version 1, RFC 2741, Digital Equipment Corporation, IBM T.J. Watson Research, Ellison Software Consulting, Cisco Systems, January 2000","DOI":"10.17487\/rfc2741"},{"key":"10.1016\/S1389-1286(00)00148-1_BIB37","unstructured":"J.S. Fritzinger, M. Mueller, Java Security, White Paper, Sun Microsystems, 1996"},{"key":"10.1016\/S1389-1286(00)00148-1_BIB38","unstructured":"S. Oaks, Java Security, O'Reilly, Sebastopol, CA, 1998"},{"key":"10.1016\/S1389-1286(00)00148-1_BIB39","unstructured":"I. Goldberg, D. Wagner, R. Thomas, E. Brewer, A secure environment for untrusted helper applications, in: Proceedings of the Sixth Usenix Security Symposium, San Jose, July 996"},{"key":"10.1016\/S1389-1286(00)00148-1_BIB40","unstructured":"J.Y. Levy, L. Demailly, J.K. Ousterhout, B. Welch, The Safe-Tcl security model, in: Proceedings of the USENIX Annual Technical Conference, June 1998"},{"key":"10.1016\/S1389-1286(00)00148-1_BIB41","unstructured":"G. van Rossum, Python Library Reference, 1.5.2 ed., Corporation for National Research Initiatives (CNRI), July 1999"},{"key":"10.1016\/S1389-1286(00)00148-1_BIB42","doi-asserted-by":"crossref","unstructured":"J. Sch\u00f6nw\u00e4lder, J. Quittek, Script MIB Extensibility Protocol Version 1.0, RFC 2593, TU Braunschweig, NEC Europe Ltd., May 1999","DOI":"10.17487\/rfc2593"}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128600001481?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128600001481?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,1,17]],"date-time":"2020-01-17T09:19:39Z","timestamp":1579252779000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128600001481"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001,1]]},"references-count":42,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2001,1]]}},"alternative-id":["S1389128600001481"],"URL":"https:\/\/doi.org\/10.1016\/s1389-1286(00)00148-1","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[2001,1]]}}}