{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T09:39:39Z","timestamp":1770284379729,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540250791","type":"print"},{"value":"9783540318453","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-31845-3_3","type":"book-chapter","created":{"date-parts":[[2010,7,5]],"date-time":"2010-07-05T19:43:57Z","timestamp":1278359037000},"page":"21-40","source":"Crossref","is-referenced-by-count":10,"title":["The Oz-E Project: Design Guidelines for a Secure Multiparadigm Programming Language"],"prefix":"10.1007","author":[{"given":"Fred","family":"Spiessens","sequence":"first","affiliation":[]},{"given":"Peter","family":"Van Roy","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Armstrong, J.: Making Reliable Distributed Systems in the Presence of Software Errors. PhD thesis, Royal Institute of Technology (KTH), Stockholm (December 2003)"},{"key":"3_CR2","volume-title":"Concurrent Programming in Erlang","author":"J. Armstrong","year":"1996","unstructured":"Armstrong, J., Williams, M., Wikstr\u00f6m, C., Virding, R.: Concurrent Programming in Erlang. Prentice-Hall, Englewood Cliffs (1996)"},{"key":"3_CR3","unstructured":"Banna, Z.E., Klintskog, E., Brand, P.: Report on security services in distribution subsystem. Technical Report PEPITO Project Deliverable D4.4 (EU contract IST-2001-33234), K.T.H., Stockholm (January 2004)"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Cartwright, R., Fagan, M.: Soft typing. In: Proceedings of the SIGPLAN 1991 Conference on Programming Language Design and Implementation, pp. 278\u2013292 (1991)","DOI":"10.1145\/113445.113469"},{"key":"3_CR5","volume-title":"Design Patterns: Elements of Reusable Object-Oriented Software","author":"E. Gamma","year":"1994","unstructured":"Gamma, E., Helm, R., Johnson, R., Vlissides, J.: Design Patterns: Elements of Reusable Object-Oriented Software. Addison Wesley, Massachusetts (1994)"},{"issue":"4","key":"3_CR6","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1145\/54289.871709","volume":"22","author":"N. Hardy","year":"1989","unstructured":"Hardy, N.: The confused deputy. ACM SIGOPS Oper. Syst. Rev.\u00a022(4), 36\u201338 (1989), \n                    \n                      http:\/\/www.cap-lore.com\/CapTheory\/ConfusedDeputy.html","journal-title":"ACM SIGOPS Oper. Syst. Rev."},{"key":"3_CR7","unstructured":"Hewitt, C., Bishop, P., Steiger, R.: A universal modular ACTOR formalism for artificial intelligence. In: 3rd International Joint Conference on Artificial Intelligence (IJCAI), August 1973, pp. 235\u2013245 (1973)"},{"issue":"3","key":"3_CR8","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1016\/0004-3702(77)90033-9","volume":"8","author":"C. Hewitt","year":"1977","unstructured":"Hewitt, C.: Viewing control structures as patterns of passing messages. Journal of Artificial Intelligence\u00a08(3), 323\u2013364 (1977)","journal-title":"Journal of Artificial Intelligence"},{"key":"3_CR9","unstructured":"Klintskog, E., Banna, Z.E., Brand, P.: A generic middleware for intra-language transparent distribution. Technical Report T2003:01, Swedish Institute of Computer Science (June 2003)"},{"key":"3_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/3-540-45472-1_24","volume-title":"Financial Cryptography","author":"M.S. Miller","year":"2001","unstructured":"Miller, M.S., Morningstar, C., Frantz, B.: Capability-based financial instruments. In: Frankel, Y. (ed.) FC 2000. LNCS, vol.\u00a01962, pp. 349\u2013378. Springer, Heidelberg (2001)"},{"issue":"1","key":"3_CR11","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/361932.361937","volume":"16","author":"J.H. Morris","year":"1973","unstructured":"Morris, J.H.: Protection in programming languages. Communications of the ACM\u00a016(1), 15\u201321 (1973)","journal-title":"Communications of the ACM"},{"key":"3_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/978-3-540-40965-6_15","volume-title":"Advances in Computing Science \u2013 ASIAN 2003. Progamming Languages and Distributed Computation Programming Languages and Distributed Computation","author":"M.S. Miller","year":"2003","unstructured":"Miller, M.S., Shapiro, J.: Paradigm regained: Abstraction mechanisms for access control. In: Saraswat, V.A. (ed.) ASIAN 2003. LNCS, vol.\u00a02896, pp. 224\u2013242. Springer, Heidelberg (2003)"},{"key":"3_CR13","unstructured":"Miller, M., Stiegler, M., Close, T., Frantz, B., Yee, K.-P., Morningstar, C., Shapiro, J., Hardy, N., Tribble, E.D., Barnes, D., Bornstien, D., Wilcox-O\u2019Hearn, B., Stanley, T., Reid, K., Darius Bacon, E.: Open source distributed capabilities (2001) Available at, \n                    \n                      http:\/\/www.erights.org"},{"key":"3_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/978-3-540-31845-3_2","volume-title":"Multiparadigm Programming in Mozart\/Oz","author":"M.S. Miller","year":"2005","unstructured":"Miller, M.S., Tulloh, B., Shapiro, J.S.: The structure of authority: Why security is not a separable concern. In: Van Roy, P. (ed.) MOZ 2004. LNCS, vol.\u00a03389, pp. 2\u201320. Springer, Heidelberg (2005)"},{"key":"3_CR15","unstructured":"Rees, J.A.: A security kernel based on the lambda-calculus. Technical report. MIT (1996)"},{"key":"3_CR16","unstructured":"Reid, K.: [e-lang] Proposal: Auditors without unshadowable names (August 2004) Mail posted at e-lang mailing list, Available at, \n                    \n                      http:\/\/www.eros-os.org\/pipermail\/e-lang\/2004-August\/010029.html"},{"key":"3_CR17","unstructured":"Stiegler, M., Miller, M.S.: A capability based client: The darpabrowser. Technical Report Focused Research Topic 5 \/ BAA-00-06-SNK, Combex, Inc.,(June 2002) Avalalbe at, \n                    \n                      http:\/\/www.combex.com\/papers\/darpa-report\/index.html"},{"key":"3_CR18","unstructured":"Spiessens, F., Miller, M., Roy, P.V., Shapiro, J.: Authority Reduction in Protection Systems (2004) available at, \n                    \n                      http:\/\/www.info.ucl.ac.be\/people\/fsp\/ARS.pdf"},{"key":"3_CR19","unstructured":"Stiegler, M.: The SkyNet virus: Why it is unstoppable; how to stop it.Talk available at,\n                    \n                      http:\/\/www.erights.org\/talks\/skynet\/"},{"key":"3_CR20","unstructured":"Stiegler, M.: The E Language in a Walnut (2000), Draft available at, \n                    \n                      http:\/\/www.erights.org"},{"key":"3_CR21","volume-title":"Concepts, Techniques, and Models of Computer Programming","author":"P. Roy Van","year":"2004","unstructured":"Van Roy, P., Haridi, S.: Concepts, Techniques, and Models of Computer Programming. MIT Press, Cambridge (2004)"},{"key":"3_CR22","unstructured":"Yee, K.-P.: User interaction design for secure systems. In: 4th International Conference on Information and Communications Security (ICICS 2002). UC Berkeley Technical Report CSD-02-1184 (2002)"},{"key":"3_CR23","unstructured":"Yee, K.-P., Miller, M.S.: Auditors: An extensible, dynamic code verification mechanism (2000) Available at,\n                    \n                      http:\/\/www.erights.org\/elang\/kernel\/auditors\/"}],"container-title":["Lecture Notes in Computer Science","Multiparadigm Programming in Mozart\/Oz"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-31845-3_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T10:27:24Z","timestamp":1552645644000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-31845-3_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540250791","9783540318453"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-31845-3_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005]]}}}