{"id":"https://openalex.org/W2166948889","doi":"https://doi.org/10.1109/icnc.2009.472","title":"A Novel Secure Access Method for Remote Databases Based on Mobile Agents","display_name":"A Novel Secure Access Method for Remote Databases Based on Mobile Agents","publication_year":2009,"publication_date":"2009-01-01","ids":{"openalex":"https://openalex.org/W2166948889","doi":"https://doi.org/10.1109/icnc.2009.472","mag":"2166948889"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnc.2009.472","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072764273","display_name":"Jing Huang","orcid":"https://orcid.org/0000-0002-5542-9643"},"institutions":[{"id":"https://openalex.org/I136765683","display_name":"Tianjin University of Technology","ror":"https://ror.org/00zbe0w13","country_code":"CN","type":"funder","lineage":["https://openalex.org/I136765683"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Huang","raw_affiliation_strings":["Tianjin University of Technology, Tianjin, CN"],"affiliations":[{"raw_affiliation_string":"Tianjin University of Technology, Tianjin, CN","institution_ids":["https://openalex.org/I136765683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082799071","display_name":"Yingyuan Xiao","orcid":"https://orcid.org/0000-0002-5711-8638"},"institutions":[{"id":"https://openalex.org/I136765683","display_name":"Tianjin University of Technology","ror":"https://ror.org/00zbe0w13","country_code":"CN","type":"funder","lineage":["https://openalex.org/I136765683"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yingyuan Xiao","raw_affiliation_strings":["Tianjin University of Technology, Tianjin, CN"],"affiliations":[{"raw_affiliation_string":"Tianjin University of Technology, Tianjin, CN","institution_ids":["https://openalex.org/I136765683"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5049054625","display_name":"Yi Liang","orcid":"https://orcid.org/0000-0002-1296-4371"},"institutions":[{"id":"https://openalex.org/I136765683","display_name":"Tianjin University of Technology","ror":"https://ror.org/00zbe0w13","country_code":"CN","type":"funder","lineage":["https://openalex.org/I136765683"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yi Liang","raw_affiliation_strings":["Tianjin University of Technology, Tianjin, CN"],"affiliations":[{"raw_affiliation_string":"Tianjin University of Technology, Tianjin, CN","institution_ids":["https://openalex.org/I136765683"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.247,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":2,"citation_normalized_percentile":{"value":0.374866,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":71,"max":75},"biblio":{"volume":null,"issue":null,"first_page":"519","last_page":"522"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9953,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12288","display_name":"Optimization and Search Problems","score":0.9848,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/data-access","display_name":"Data access","score":0.50149894},{"id":"https://openalex.org/keywords/mobile-agent","display_name":"Mobile agent","score":0.46268594}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.817757},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5955964},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.50149894},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.4987557},{"id":"https://openalex.org/C84875433","wikidata":"https://www.wikidata.org/wiki/Q3277848","display_name":"Mobile agent","level":2,"score":0.46268594},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4603377},{"id":"https://openalex.org/C127353759","wikidata":"https://www.wikidata.org/wiki/Q6887091","display_name":"Mobile database","level":4,"score":0.44919914},{"id":"https://openalex.org/C14982408","wikidata":"https://www.wikidata.org/wiki/Q11006334","display_name":"Network Access Control","level":4,"score":0.44023284},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.43702534},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.34949285},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.2236},{"id":"https://openalex.org/C207029474","wikidata":"https://www.wikidata.org/wiki/Q384018","display_name":"Mobile station","level":3,"score":0.17208675},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.14338669},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11508986},{"id":"https://openalex.org/C68649174","wikidata":"https://www.wikidata.org/wiki/Q1379116","display_name":"Base station","level":2,"score":0.11021221}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnc.2009.472","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.44,"display_name":"Industry, innovation and infrastructure"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":4,"referenced_works":["https://openalex.org/W2104799982","https://openalex.org/W2132238817","https://openalex.org/W90561696","https://openalex.org/W96563326"],"related_works":["https://openalex.org/W3081471909","https://openalex.org/W2595312624","https://openalex.org/W2499263230","https://openalex.org/W2390458437","https://openalex.org/W2253574742","https://openalex.org/W2170410746","https://openalex.org/W2163934533","https://openalex.org/W2157967323","https://openalex.org/W2134432369","https://openalex.org/W1578117481"],"abstract_inverted_index":{"With":[0],"the":[1,44,54,75,94,134,139],"rapid":[2],"development":[3],"of":[4,64,77,124,141],"network,":[5],"some":[6,83],"novel":[7],"applications":[8],"like":[9],"remote":[10,38,68,109,125],"database":[11],"access,":[12],"electric":[13],"commerce,":[14],"etc.":[15],"bring":[16],"forth":[17],"many":[18],"new":[19],"requirements":[20],"for":[21,108],"network":[22,24,28],"loads,":[23],"communication":[25,55],"efficiency":[26,56],"and":[27,57,90,117],"security.":[29],"This":[30],"paper":[31],"adopts":[32],"mobile":[33,98,113],"agent":[34],"technology":[35,129],"to":[36,40,43,82,120],"achieve":[37],"access":[39,106],"databases.":[41],"Compared":[42],"traditional":[45],"C/S":[46,135],"computing":[47,136],"model,":[48],"this":[49,105,128],"method":[50,107],"can":[51,79],"significantly":[52],"improve":[53],"system":[58],"performance":[59],"when":[60],"a":[61,121],"large":[62,122],"number":[63,123],"data":[65,78,126],"located":[66],"at":[67],"sites":[69],"must":[70],"be":[71,80],"handled.":[72],"In":[73],"addition,":[74],"security":[76,116],"enhanced":[81],"extent":[84],"by":[85,97],"using":[86],"message":[87],"digest,":[88],"encryption":[89],"decryption":[91],"techniques":[92],"on":[93,112],"results":[95],"carried":[96],"agents.":[99],"The":[100],"experimental":[101],"result":[102],"shows":[103],"that":[104],"databases":[110],"based":[111],"agents":[114],"is":[115],"feasible.":[118],"Especially":[119],"processing,":[127],"gets":[130],"more":[131],"advantages":[132],"over":[133],"model":[137],"in":[138],"aspect":[140],"performance.":[142]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2166948889","counts_by_year":[{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-03-18T19:24:51.423452","created_date":"2016-06-24"}