{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T14:28:25Z","timestamp":1725460105113},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540254720"},{"type":"electronic","value":"9783540266617"}],"license":[{"start":{"date-parts":[[1998,1,1]],"date-time":"1998-01-01T00:00:00Z","timestamp":883612800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/3-540-26661-5_35","type":"book-chapter","created":{"date-parts":[[2006,2,19]],"date-time":"2006-02-19T23:53:43Z","timestamp":1140393223000},"page":"823-854","source":"Crossref","is-referenced-by-count":0,"title":["Distributed Processing: DCE, CORBA, and Java"],"prefix":"10.1007","author":[{"given":"Andy","family":"Bond","sequence":"first","affiliation":[]},{"given":"Keith","family":"Duddy","sequence":"additional","affiliation":[]},{"given":"Kerry","family":"Raymond","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"35_CR1","unstructured":"Arnold, K., Gosling, J., The Java Programming Language, Addison-Wesley, 1996 [Ap] http:\/\/www.appletmagic.com, Intermetrics"},{"key":"35_CR2","unstructured":"The Common Object Request Broker: Architecture and Specification, Revision 2.0, OMG, 1995"},{"key":"35_CR3","unstructured":"CORBAservices: Common Object Services Specification, Revised Edition-Updated, OMG, 1996"},{"key":"35_CR4","unstructured":"Security Service Specification, Version 1.0, OMG Documents 97-07-23 and 97-07-24, November 1996 [Tr] Transarc DCE Encina Lightweight Client, http:\/\/www.transarc.com\/afs\/transarc.com\/public\/www\/Public\/ProdServ\/Product\/DELight\/index.html"},{"key":"35_CR5","unstructured":"Duddy, K., Vogel, A., Java Programming with CORBA, John Wiley & Sons Inc., 1997"},{"key":"35_CR6","unstructured":"Fisher, G., Kenny, D., Rosenberry, W., Understanding DCE, O\u2019Reilly & Associates Inc., 1992"},{"key":"35_CR7","unstructured":"Fritzinger, J. S., Muller, M., Java Security, http:\/\/java.sun.com\/security\/whitepaper.ps, Sun Microsystems, 1997"},{"key":"35_CR8","unstructured":"Gosling, J., McGilton, H., The Java Language Overview: A White Paper, Sun Microsystems Technical Report, 1995"},{"key":"35_CR9","unstructured":"Gosling, J., McGilton, H., The Java Language Environment: A White Paper, http:\/\/java.sun.com\/docs\/white\/langenv\/, Sun Microsystems, 1996"},{"key":"35_CR10","unstructured":"HotJava Browser, http:\/\/java.sun.com\/products\/hotjava\/, Sun Microsystems"},{"key":"35_CR11","unstructured":"Hu, W., Shirley, J., Guide to Writing DCE Applications (Second Edition), O\u2019Reilly & Associates Inc., 1994"},{"key":"35_CR12","unstructured":"Hu, W., DCE Security Programming, O\u2019Reilly & Associates Inc., 1995"},{"key":"35_CR13","unstructured":"IDL\/Java Language Mapping, OMG TC Document orbos\/97-03-01, 1997"},{"key":"35_CR14","unstructured":"The Java Language: An Overview, http:\/\/java.sun.com\/docs\/overviews\/java\/java-overview-1.html, Sun Microsystems"},{"key":"35_CR15","unstructured":"Lockhart, H. W., OSF DCE: Guide to Developing Distributed Applications, McGraw Hill, 1994"},{"key":"35_CR16","doi-asserted-by":"crossref","unstructured":"Lindholm, T., Yellin, F., The Java Virtual Machine Specification, Addison-Wesley, 1997","DOI":"10.1016\/S1353-4858(97)83033-4"},{"key":"35_CR17","unstructured":"Object Management Group, http:\/\/www.omg.org"},{"key":"35_CR18","unstructured":"OMG \u2014 Technical Committee Work in Progress, http:\/\/www.omg.org\/schedule\/"},{"key":"35_CR19","unstructured":"IEEE Std 1003.1-1990 Standard for Information Technology \u2014 Portable Operating System Interface (POSIX)-Part 1: System Application Programming Interface (API)"},{"key":"35_CR20","unstructured":"P1003.1a Draft Revision to Information Technology \u2014 POSIX Part 1: System Application Program Interface (API) [C Language]"},{"key":"35_CR21","unstructured":"Remote Method Invocation Specification, http:\/\/www.javasoft.com:80\/products\/jdk\/1.1\/docs\/guide\/rmi\/spec\/ rmiTOC.doc.html"},{"key":"35_CR22","unstructured":"Secure Computing With Java: Now and the Future, http:\/\/java.sun.com\/marketing\/collateral\/security.html, Sun"},{"key":"35_CR23","unstructured":"Soley, R. M., Object Management Architecture Guide, Third Edition, John Wiley & Sons, 1995"},{"key":"35_CR24","unstructured":"Trading Object Service, OMG TC Document orbos\/96-07-26, 1996"}],"container-title":["Handbook on Architectures of Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-26661-5_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T20:22:25Z","timestamp":1558383745000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-26661-5_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540254720","9783540266617"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/3-540-26661-5_35","relation":{},"subject":[],"published":{"date-parts":[[1998]]}}}