{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T06:31:37Z","timestamp":1747463497696,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540647928"},{"type":"electronic","value":"9783540686712"}],"license":[{"start":{"date-parts":[[1998,1,1]],"date-time":"1998-01-01T00:00:00Z","timestamp":883612800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/3-540-68671-1_12","type":"book-chapter","created":{"date-parts":[[2007,8,1]],"date-time":"2007-08-01T02:15:31Z","timestamp":1185934531000},"page":"217-234","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["The Safe-Tcl Security Model"],"prefix":"10.1007","author":[{"given":"John K.","family":"Ousterhout","sequence":"first","affiliation":[]},{"given":"Jacob Y.","family":"Levy","sequence":"additional","affiliation":[]},{"given":"Brent B.","family":"Welch","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1998,6,18]]},"reference":[{"key":"12_CR1","unstructured":"K. Arnold and J. Gosling, The Java Programming Language, Addison-Wesley, ISBN 0-201-63455-4, 1996."},{"key":"12_CR2","volume-title":"IFIP WG 6.5 Conference","author":"N. Borenstein","year":"1994","unstructured":"N. Borenstein, \u201cEMail With A Mind of Its Own: The Safe-Tcl Language for Enabled Mail,\u201d IFIP WG 6.5 Conference, Barcelona, May, 1994, North Holland, Amsterdam, 1994."},{"key":"12_CR3","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1145\/356778.356782","volume":"11","author":"D. Denning","year":"1979","unstructured":"D. Denning and P. Denning, \u201cData Security,\u201d Computing Surveys, Vol. 11, No. 3, September 1979, pp. 227\u2013249.","journal-title":"Computing Surveys"},{"issue":"10","key":"12_CR4","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1145\/362375.362389","volume":"16","author":"B. Lampson","year":"1973","unstructured":"B. Lampson, \u201cA Note on the Confinement Problem,\u201d Communications of the ACM, Vol. 16, No. 10, October 1973, pp. 613\u2013615.","journal-title":"Communications of the ACM"},{"issue":"4","key":"12_CR5","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1145\/138873.138874","volume":"10","author":"B. Lampson","year":"1992","unstructured":"B. Lampson, M. Abadi, M. Burrows, and E. Wobber, \u201cAuthentication in Distributed Systems: Theory and Practice,\u201d ACM Transactions on Computer Systems, Vol. 10, No. 4, November 1992, pp. 265\u2013310.","journal-title":"ACM Transactions on Computer Systems"},{"key":"12_CR6","unstructured":"J. Levy, Welcome to the Tcl Plugin, http:\/\/www.sunlabs.com\/research\/tcl\/plugin\/ ."},{"key":"12_CR7","unstructured":"Netscape Inc., \u201cJavaScript in Navigator 3.0,\u201d http:\/\/www.home.netscape.com\/eng\/mozilla\/3.0\/handbook\/javascript\/atlas.html#taint_dg ."},{"key":"12_CR8","unstructured":"J. Ousterhout, Tcl and the Tk Toolkit, Addison-Wesley, ISBN 0-201-63337-X, 1994."},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"R. Rivest, The MD5 Message Digest Algorithm, RFC 1321, April 1992.","DOI":"10.17487\/rfc1321"},{"issue":"5","key":"12_CR10","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1145\/173668.168635","volume":"27","author":"R. Wahbe","year":"1993","unstructured":"R. Wahbe, S. Lucco, T. Anderson, and S. Graham, \u201cEfficient Software-Based Fault Isolation,\u201d Proc. 14th Symposium on Operating Systems Principles, Operating Systems Review, Vol. 27, No. 5, December, 1993, pp. 203\u2013216.","journal-title":"Operating Systems Review"},{"key":"12_CR11","unstructured":"B. Welch, Practical Programming in Tcl and Tk, Prentice-Hall, ISBN 0-13-182007-9, 1995."},{"key":"12_CR12","unstructured":"J. White, Telescript Technology: The Foundation for the Electronic Marketplace, white paper, General Magic, Inc., 1994."},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"F. Yellin, \u201cLow Level Security in Java,\u201d World-Wide Web Conference, Boston MA, December 1995. Also available as http:\/\/www.javasoft.com\/sfaq\/verifier.html .","DOI":"10.1145\/3592626.3592656"}],"container-title":["Lecture Notes in Computer Science","Mobile Agents and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-68671-1_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,17]],"date-time":"2024-02-17T05:16:20Z","timestamp":1708146980000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-68671-1_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540647928","9783540686712"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/3-540-68671-1_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]},"assertion":[{"value":"18 June 1998","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}