{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:05:21Z","timestamp":1725483921627},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540438472"},{"type":"electronic","value":"9783540454403"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45440-3_2","type":"book-chapter","created":{"date-parts":[[2007,5,13]],"date-time":"2007-05-13T11:42:06Z","timestamp":1179056526000},"page":"15-30","source":"Crossref","is-referenced-by-count":3,"title":["A Contract-Based Approach of Resource-Constrained Software Deployment"],"prefix":"10.1007","author":[{"given":"Nicolas","family":"Le Sommer","sequence":"first","affiliation":[]},{"given":"Fr\u00e9d\u00e9ric","family":"Guidec","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,6,21]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Godmar Back, Wilson C. Hsieh, and Jay Lepreau. Processes in KaffeOS: Isolation, Resource Management, and Sharing in Java. In The 4th Symposium on Operating Systems Design and Implementation, October 2000.","key":"2_CR1","DOI":"10.21236\/ADA440101"},{"unstructured":"Godmar Back, Patrick Tullmann, Legh Stoller, Wilson C. Hsieh, and Jay Lepreau. Techniques for the Design of Java Operating Systems. In USENIX Annual Technical Conference, June 2000.","key":"2_CR2"},{"unstructured":"Nataraj Bagaratnan and Steven B. Byrne. Resource Access Control for an Internet UserAgent. In The 3th USENIX Conference on Object-Oriented Technologie and Systems, 1997.","key":"2_CR3"},{"doi-asserted-by":"crossref","unstructured":"Antoine Beugnard, Jean-Marc J\u00e9z\u00e9quel, No\u00ebl Plouzeau, and Damien Watkins. Making components contract-aware. In IEEE, editor, Computer, page 38\u201344. IEEE, June 1999.","key":"2_CR4","DOI":"10.1109\/2.774917"},{"doi-asserted-by":"crossref","unstructured":"Grzegorz Czajkowski and Thorsten von Eicken. JRes: a Resource Accounting Interface for Java. In ACM OOPSLA Conference, 1998.","key":"2_CR5","DOI":"10.1145\/286936.286944"},{"unstructured":"David Evans. Policy-Directed Code Safety. PhD thesis, Massachussets Institute of Technology, February 2000.","key":"2_CR6"},{"doi-asserted-by":"crossref","unstructured":"David Evans and Andrew Twyman. Flexible Policy-Directed Code Safety. In IEEE Security and Privacy, May 1999.","key":"2_CR7","DOI":"10.1109\/SECPRI.1999.766716"},{"doi-asserted-by":"crossref","unstructured":"Fangzhe Chang and Ayal Itzkovitz and Vijay Karamcheti. User-level Resourceconstrained Sandboxing. In-. The 4 th USENIX Windows Systems Symposium, August 2000.","key":"2_CR8","DOI":"10.21236\/ADA439735"},{"doi-asserted-by":"crossref","unstructured":"Li Gong. Java Security: Present and Near Future. IEEE Micro,-:14\u201319, May 1997.","key":"2_CR9","DOI":"10.1109\/40.591650"},{"unstructured":"Li Gong and Roland Schemers. Implementing Protection Domains in the Java Development Kit 1.2. In Internet Society Symposium on Network and Distributed System Scurity, March 1998.","key":"2_CR10"},{"unstructured":"Chris Hawblitzel, Chi-Chao Chang, Grzegorz Czajkowski, Deyu Hu, and Thorsten von Eicken. Implementing Multiple Protection Domains in Java. In USENIX Annual Technical Conference, June 1998.","key":"2_CR11"},{"doi-asserted-by":"crossref","unstructured":"J.-M. J\u00e9z\u00e9quel, D. Deveaux, and Y. Le Traon. Reliable Objects: a Lightweight Approach applied to Java. IEEE Software, 18(4):76\u201383, July\/August 2001.","key":"2_CR12","DOI":"10.1109\/MS.2001.936221"},{"doi-asserted-by":"crossref","unstructured":"Kihun Kim and Klara Nahrstedt. A Resource Broker Model with Integrated Reservation Scheme. In IEEE International Conference on Multimedia and Expo (II), pages 859\u2013862, 2000.","key":"2_CR13","DOI":"10.1109\/ICME.2000.871495"},{"doi-asserted-by":"crossref","unstructured":"U. Lindqvist, T. Olovsson, and E. Jonsson. An Analysis of a Secure System Based on Trusted Components. In Proc. 11th Ann. Conf. Computer Assurance, pages 213\u2013223. IEEE Press, 1996.","key":"2_CR14","DOI":"10.1109\/CMPASS.1996.507889"},{"doi-asserted-by":"crossref","unstructured":"B. Meyer, C. Mingins, and H. Schmidt. Providing Trusted Components to the Industry. IEEE Computer, pages 104\u201315, May 1998.","key":"2_CR15","DOI":"10.1109\/2.675643"},{"doi-asserted-by":"crossref","unstructured":"Raju Pandey and Brant Hashii. Providing Fine-Grained Access Control for Java Programs. In The 13th Conference on Object-Oriented Programming, ECOOP\u201999. Springer-Verlag, June 1999.","key":"2_CR16","DOI":"10.1007\/3-540-48743-3_21"},{"unstructured":"Clemens Szyperski. Component Software: Beyond Object-Oriented Programming. ACM Press, Addison-Wesley, 1998.","key":"2_CR17"}],"container-title":["Lecture Notes in Computer Science","Component Deployment"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45440-3_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T21:51:46Z","timestamp":1556401906000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45440-3_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540438472","9783540454403"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/3-540-45440-3_2","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}