{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:44:05Z","timestamp":1725493445931},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540007081"},{"type":"electronic","value":"9783540365327"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36532-x_8","type":"book-chapter","created":{"date-parts":[[2007,10,25]],"date-time":"2007-10-25T19:34:36Z","timestamp":1193340876000},"page":"112-132","source":"Crossref","is-referenced-by-count":14,"title":["SoftwarePot: An Encapsulated Transferable File System for Secure Software Circulation"],"prefix":"10.1007","author":[{"given":"Kazuhiko","family":"Kato","sequence":"first","affiliation":[]},{"given":"Yoshihiro","family":"Oyama","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,6,25]]},"reference":[{"unstructured":"A. Acharya and M. Raje. MAPbox: Using Parameterized Behavior Classes to Confine Untrusted Applications. In Proceedings of the 9th USENIX Security Symposium, Denver, August 2000.","key":"8_CR1"},{"issue":"3","key":"8_CR2","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1145\/290409.290410","volume":"16","author":"A. Alexandrov","year":"1998","unstructured":"A. Alexandrov, M. Ibel, K. E. Schauser, and C. J. Scheiman. UFO: A Personal Global File System Based on User-Level Extensions to the Operating System. ACM Transactions on Computer Systems, 16(3):207\u2013233, August 1998.","journal-title":"ACM Transactions on Computer Systems"},{"doi-asserted-by":"crossref","unstructured":"L. Cardelli and A. D. Gordon. Mobile ambients. Theoretical Computer Science, 204\/1, Jul. 2000. Special issue on Coordination.","key":"8_CR3","DOI":"10.1016\/S0304-3975(99)00231-5"},{"unstructured":"C. Cowan, S. Beattie, G. K.-Hartman, C. Pu, P. Wagle, and V. Gligor. SubDomain: Parsimonious Server Security. In Proceedings of the 14th Systems Administration Conference (LISA 2000), New Orleans, December 2000.","key":"8_CR4"},{"unstructured":"I. Goldberg, D. Wagner, R. Thomas, and E. A. Brewer. A Secure Environment for Untrusted Helper Applications: Confining the Wily Hacker. In Proceedings of the 6th USENIX Security Symposium, San Jose, July 1996.","key":"8_CR5"},{"unstructured":"D. Hendricks. A filesystem for software development. In USENIX-Summer\u201990, pages 333\u2013340, Jun. 1990.","key":"8_CR6"},{"unstructured":"K. Ishii, Y. Shinjo, K. Nishio, J. Sun, and K. Itano. The Implementation of an Operating System Based on the Parallel World Model by Tracing System Calls. InProceedings of the IEICE\/IPSJ CPSY OS\u2019 99, Okinawa, May 1999. In Japanese.","key":"8_CR7"},{"issue":"5","key":"8_CR8","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/52.605931","volume":"14","author":"N. Islam","year":"1997","unstructured":"N. Islam, R. Anand, T. Jaeger, and J. R. Rao. A Flexible Security System for Using Internet Content. IEEE Software, 14(5):52\u201359, 1997.","journal-title":"IEEE Software"},{"doi-asserted-by":"crossref","unstructured":"K. Kato and Y. Oyama. Softwarepot: An encapsulated transferable file system for secure software circulation. Technical Report ISE-TR-02-185, Institute of Information Sciences and Electronics, University of Tsukuba, Jan. 2002.","key":"8_CR9","DOI":"10.1007\/3-540-36532-X_8"},{"issue":"S1","key":"8_CR10","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1002\/spe.4380201304","volume":"20","author":"D. G. Korn","year":"1990","unstructured":"D. G. Korn and E. Krell. A New Dimension for the Unix File System. Software-Practice and Experience, 20(S1):19\u201334, 1990.","journal-title":"Software-Practice and Experience"},{"unstructured":"J. Y. Levy, L. Demailly, J. K. Ousterhout, and B. B. Welch. The Safe-Tcl Security Model. In Proceedings of the USENIX Annual Technical Conference (NO 98), New Orleans, June 1998.","key":"8_CR11"},{"unstructured":"V. Prevelakis and D. Spinellis. Sandboxing Applications. In Proceedings of 2001 USENIX Annual Technical Conference, FREENIX Track, Boston, June 2001.","key":"8_CR12"},{"unstructured":"William Stallings. Cryptography and Network Security-Principles and Practice. Prentice-Hall, 2nd edition, 1999.","key":"8_CR13"},{"unstructured":"L. D. Stein. SBOX: Put CGI Scripts in a Box. In Proceedings of the USENIX Annual Technical Conference, Monterey, June 1999.","key":"8_CR14"},{"doi-asserted-by":"crossref","unstructured":"R. Wahbe, S. Lucco, T. E. Anderson, and S. L. Graham. Efficient Software-Based Fault Isolation. In Proceedings of the 14th ACM Symposium on Operating System Principles (SOSP\u2019 93), pages 203\u2013216, Asheville, December 1993.","key":"8_CR15","DOI":"10.1145\/168619.168635"}],"container-title":["Lecture Notes in Computer Science","Software Security \u2014 Theories and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36532-X_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,14]],"date-time":"2023-05-14T14:22:41Z","timestamp":1684074161000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36532-X_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540007081","9783540365327"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/3-540-36532-x_8","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}