{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T14:18:43Z","timestamp":1742393923911},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540661306"},{"type":"electronic","value":"9783540487494"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-48749-2_22","type":"book-chapter","created":{"date-parts":[[2007,10,19]],"date-time":"2007-10-19T08:22:57Z","timestamp":1192782177000},"page":"469-489","source":"Crossref","is-referenced-by-count":19,"title":["Introducing Trusted Third Parties to the Mobile Agent Paradigm"],"prefix":"10.1007","author":[{"given":"Uwe G.","family":"Wilhelm","sequence":"first","affiliation":[]},{"given":"Sebastian","family":"Staamann","sequence":"additional","affiliation":[]},{"given":"Levente","family":"Butty\u00e1n","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"R. Anderson and M. Kuhn. Tamper resistance \u2014 a cautionary note. In The Second USENIX Workshop on Electronic Commerce Proceedings, pages 1\u201311, Oakland, California, November 1996."},{"issue":"8","key":"22_CR2","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1016\/0167-4048(90)90114-9","volume":"9","author":"H. B\u00fcrk","year":"1990","unstructured":"H. B\u00fcrk and A. Pfitzmann. Value exchange systems enabling security and unobservability. Computers & Security, 9(8):715\u2013721, 1990.","journal-title":"Computers & Security"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"A. Carzaniga, G. P. Picco, and G. Vigna. Designing distributed applications with mobile code paradigms. In R. Taylor, editor, Proceedings of the 19th International Conference on Software Engineering (ICSE\u201997), pages 22\u201332. ACM Press, 1997.","DOI":"10.1145\/253228.253236"},{"issue":"3","key":"22_CR4","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/98.468361","volume":"2","author":"D. M. Chess","year":"1995","unstructured":"D. M. Chess, B. Grosof, C. G. Harrison, D. Levine, C. Parris, and G. Tsudik. Itinerant agents for mobile computing. IEEE Personal Communications, 2(3):34\u201349, October 1995.","journal-title":"IEEE Personal Communications"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"W. Diffie and M. E. Hellman. New directions in cryptography. IEEE Transactions on Information Theory, IT-22(6), November 1976.","DOI":"10.1109\/TIT.1976.1055638"},{"key":"22_CR6","unstructured":"DoD. Trusted Computer System Evaluation Criteria (TCSEC). Technical Report DoD 5200.28-STD, Department of Defense, December 1985."},{"key":"22_CR7","unstructured":"J. Gosling and H. McGilton. The Java language environment. White paper, Sun Microsystems, Inc., 1996."},{"key":"22_CR8","unstructured":"R.S. Gray. Agent Tel: A transportable agent system. In Proceedings of the CIKM Workshop on Intelligent Information Agents, Baltimore, MD, December 1995."},{"key":"22_CR9","series-title":"Lect Notes Comput Sci","first-page":"25","volume-title":"Mobile Object Systems: Towards the Programmable Internet","author":"C. G. Harrison","year":"1997","unstructured":"C. G. Harrison, D. M. Chess, and A. Kershenbaum. Mobile agents: Are they a good idea? In Mobile Object Systems: Towards the Programmable Internet, volume 1222 of Lecture Notes in Computer Science, pages 25\u201347. Springer Verlag, 1997."},{"key":"22_CR10","unstructured":"ITU. ITU-T Recommendation X.509: The Directory \u2014 Authentication Framework. International Telecommunication Union, 1993."},{"key":"22_CR11","unstructured":"D. B. Lange and M. Ishima. Program and Deploying Java Mobile Agents with Aglets. Addison-Wesley, 1998."},{"key":"22_CR12","unstructured":"A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone. Handbook of applied cryptography. CRC Press, Inc., 1997."},{"key":"22_CR13","unstructured":"J. Ordille. When agents roam, who can you trust? Technical Report Technical Report, Computing Science Research Center, Bell Labs, 1996."},{"key":"22_CR14","unstructured":"RSA Data Security, Inc. PKCS #1: RSA Encryption Standard. RSA Data Security, Inc., November 1993."},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"R. A. Rueppel. A formal approach to security architectures. In EuroCrypt, pages 387\u2013398, Brighton, England, 1991.","DOI":"10.1007\/3-540-46416-6_33"},{"key":"22_CR16","doi-asserted-by":"crossref","unstructured":"T. Sander and C. Tschudin. Towards mobile cryptography. In IEEE Symposium on Security and Privacy, May 1998.","DOI":"10.1109\/SECPRI.1998.674837"},{"key":"22_CR17","volume-title":"Applied cryptography","author":"B. Schneier","year":"1994","unstructured":"B. Schneier. Applied cryptography. Wiley, New York, 1994."},{"key":"22_CR18","first-page":"191","volume-title":"Proceedings of the USENIX Winter 1988 Technical Conference","author":"J. G. Steiner","year":"1988","unstructured":"J. G. Steiner, C. Neuman, and J. I. Schiller. Kerberos: An authentication service for open network systems. In Proceedings of the USENIX Winter 1988 Technical Conference, pages 191\u2013202. USENIX Association, Berkeley, USA, February 1988."},{"key":"22_CR19","series-title":"Lect Notes Comput Sci","volume-title":"Secure Internet Programming: Security Issues for Mobile and Distributed Objects","author":"V. Swarup","year":"1999","unstructured":"V. Swarup and J. T. Fabrega. Understanding trust. In Secure Internet Programming [22]."},{"key":"22_CR20","unstructured":"New York Times. U.S. workers stole data on 11,000, agency says, April 6, 1996."},{"key":"22_CR21","unstructured":"G. Vigna. Protecting mobile agents through tracing. In Proceedings of the Third Workshop on Mobile Object Systems, Finland, June 1997."},{"key":"22_CR22","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-48749-2","volume-title":"Secure Internet Programming: Security Issues for Mobile and Distributed Objects","author":"J. Vitek","year":"1999","unstructured":"Jan Vitek and Christian Jensen. Secure Internet Programming: Security Issues for Mobile and Distributed Objects. Lecture Notes in Computer Science. Springer-Verlag Inc., New York, NY, USA, 1999."},{"key":"22_CR23","unstructured":"J. E. White. Telescript technology: The foundation for the electronic market place. White paper, General Magic, Inc., 1994."},{"key":"22_CR24","unstructured":"U. G. Wilhelm, L. Butty\u00e0n, and S. Staamann. On the problem of trust in mobile agent systems. In Symposium on Network and Distributed System Security, pages 114\u2013124. Internet Society, March 1998."},{"issue":"1","key":"22_CR25","first-page":"3","volume":"9","author":"I. S. Winkler","year":"1996","unstructured":"I. S. Winkler. The non-technical threat to computing systems. Computing Systems, USENIX Association, 9(1):3\u201314, Winter 1996.","journal-title":"Computing Systems, USENIX Association"},{"issue":"1","key":"22_CR26","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1109\/2.108052","volume":"25","author":"T. Y. C. Woo","year":"1992","unstructured":"T. Y. C. Woo and S. S. Lam. Authentication for distributed systems. IEEE Computer, 25(1):39\u201352, January 1992.","journal-title":"IEEE Computer"},{"key":"22_CR27","series-title":"Lect Notes Comput Sci","volume-title":"Secure Internet Programming: Security Issues for Mobile and Distributed Objects","author":"B. Yee","year":"1999","unstructured":"B. Yee. A sancturary for mobile agents. In Secure Internet Programming [22]."},{"key":"22_CR28","volume-title":"PGP User\u2019s Guide","author":"P. Zimmermann","year":"1994","unstructured":"P. Zimmermann. PGP User\u2019s Guide. MIT Press, Cambridge, 1994."}],"container-title":["Lecture Notes in Computer Science","Secure Internet Programming"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48749-2_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,24]],"date-time":"2019-02-24T05:21:32Z","timestamp":1550985692000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48749-2_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540661306","9783540487494"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/3-540-48749-2_22","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1999]]}}}