{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:13:36Z","timestamp":1742912016308,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540443452"},{"type":"electronic","value":"9783540458531"}],"license":[{"start":{"date-parts":[[2002,1,1]],"date-time":"2002-01-01T00:00:00Z","timestamp":1009843200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45853-0_11","type":"book-chapter","created":{"date-parts":[[2007,5,4]],"date-time":"2007-05-04T00:42:13Z","timestamp":1178239333000},"page":"178-193","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["TINMAN: A Resource Bound Security Checking System for Mobile Code"],"prefix":"10.1007","author":[{"given":"Aloysius K.","family":"Mok","sequence":"first","affiliation":[]},{"given":"Weijiang","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,9,26]]},"reference":[{"unstructured":"Wetherall, D., Guttag, J., Tennenhouse, D.: ANTS: A Toolkit for Building and Dynamically Deploying Network Protocols. IEEE OPENARCH (1998) 117\u2013129","key":"11_CR1"},{"unstructured":"Hicks, M. W., Kakkar, P., Moore, J. T., Gunter, C. A., Nettles, S.: PLAN: A Packet Language for Active Networks. International Conference on Functional Programming (1998) 86\u201393","key":"11_CR2"},{"issue":"1","key":"11_CR3","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1145\/332799.332893","volume":"18","author":"B. Schwartz","year":"2000","unstructured":"Schwartz, B., Jackson, A.W., Strayer, W.T., Zhou W., Rockwell, D., Partridge, C.: Smart Packets: Applying Active Networks to Network Management. ACM Transactions on Computer Systems 18:1 (2000) 67\u201388","journal-title":"ACM Transactions on Computer Systems"},{"doi-asserted-by":"crossref","unstructured":"Kornblum, J., Raz, D., Shavitt, Y.: The Active Process Interaction with its Environment. Lucent Technology (1999)","key":"11_CR4","DOI":"10.1007\/3-540-40057-5_9"},{"unstructured":"Fritzinger, J. S., Mueller, M.: Java Security. Sun Microsystems white paper (1996)","key":"11_CR5"},{"unstructured":"Necula, G.C.: Proof-Carrying Code. POPL\u201997 (1997) 106\u2013119","key":"11_CR6"},{"doi-asserted-by":"crossref","unstructured":"Morrisett, G., Walker, D., Crary, K., Glew, N.: From System F to Typed Assembly Language. IEEE Symposium on Principles of Programming Languages (1998)","key":"11_CR7","DOI":"10.21236\/ADA358572"},{"unstructured":"TINMAN Project. http:\/\/www.cs.utexas.edu\/wjyu\/tinman","key":"11_CR8"},{"unstructured":"Guyer, S.Z., Jim\u00e9nez, D.A., Lin, C.: Using C-Breeze. Department of Computer Sciences, The University of Texas, (2002). http:\/\/www.cs.utexas.edu\/users\/lin\/cbz","key":"11_CR9"},{"issue":"5","key":"11_CR10","first-page":"48","volume":"25","author":"C. Y. Park","year":"1991","unstructured":"Park, C. Y., Shaw, A. C.: Experiments with a program timing tool based on source-level timing schema. Computer J 25:5 (1991) 48\u201357","journal-title":"Computer J"},{"unstructured":"Aho, A. V., Sethi, R., Ullman, J. D.: Compilers: Principles, Techniques, and Tools. Addison Wesley (1986)","key":"11_CR11"},{"unstructured":"Healy, C., Sjdin, M., Rustagi, V., Whalley, D.: Bounding Loop Iterations for Timing Analysis. IEEE Real-Time Applications Symposium (RTAS\u201998) (1998) 12\u201321","key":"11_CR12"},{"unstructured":"Unnikrishnan, L., Stoller, S.D., Liu, Y.A.: Automatic accurate stack space and heap space analysis for high-level languages. Computer Science Department, Indiana University TR 538 (2000)","key":"11_CR13"},{"key":"11_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/3-540-58468-4_158","volume-title":"FTRTFTS: Formal Techniques in Real-Time and Fault-Tolerant Systems","author":"J. Hooman","year":"1994","unstructured":"Hooman, J.: Correctness of Real Time Systems by Construction. FTRTFTS: Formal Techniques in Real-Time and Fault-Tolerant Systems LNCS 863, Springer-Verlag, (1994) 19\u201340"},{"unstructured":"Owre, S., Rushby, J., Shankar, N.: PVS: A prototype verification system. 11th International Conference on Automated Deduction, Lecture Notes in Artificial Intelligence, Springer Verlag (1992) 748\u2013752","key":"11_CR15"},{"unstructured":"Alexander, D.S., Anagnostakis, K.G., Arbaugh, W. A., Keromytis, A.D., Smith, J. M.: The Price of Safety in an Active Network. University of Pennsylvania MS-CIS-99-02 (1999)","key":"11_CR16"},{"unstructured":"Evans, D., Twyman, A.: Flexible Policy-directed Code Safety. The IEEE Symposium on Research in Security and Privacy, Research in Security and Privacy IEEE Computer Society Press (1999) 32\u201345","key":"11_CR17"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2014 ESORICS 2002"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45853-0_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,11]],"date-time":"2023-05-11T18:26:34Z","timestamp":1683829594000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45853-0_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540443452","9783540458531"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/3-540-45853-0_11","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]},"assertion":[{"value":"26 September 2002","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}