{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:38:04Z","timestamp":1725557884876},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540206934"},{"type":"electronic","value":"9783540409816"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-40981-6_12","type":"book-chapter","created":{"date-parts":[[2010,6,22]],"date-time":"2010-06-22T19:17:45Z","timestamp":1277234265000},"page":"133-151","source":"Crossref","is-referenced-by-count":0,"title":["Secure Self-certified Code for Java"],"prefix":"10.1007","author":[{"given":"M.","family":"Debbabi","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"J.","family":"Desharnais","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"M.","family":"Fourati","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"E.","family":"Menif","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"F.","family":"Painchaud","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"N.","family":"Tawbi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"12_CR1","series-title":"The Java Series","volume-title":"The Java Language Specification","author":"G. James","year":"2000","unstructured":"James, G., Bill Joy, G.S., Bracha, G.: The Java Language Specification, 2nd edn. The Java Series. Addison Wesley, Reading (2000), http:\/\/java.sun.com\/docs\/books\/jls\/index.html","edition":"2"},{"key":"12_CR2","series-title":"The Java Series","volume-title":"The Java Virtual Machine Specification","author":"T. Lindholm","year":"1999","unstructured":"Lindholm, T., Yellin, F.: The Java Virtual Machine Specification, 2nd edn. The Java Series. Addison Wesley, Reading (1999), http:\/\/java.sun.com\/docs\/books\/vmspec\/index.html","edition":"2"},{"key":"12_CR3","series-title":"The Java Series","volume-title":"The Java Tutorial","author":"K.W. Mary Campione","year":"2001","unstructured":"Mary Campione, K.W., Huml, A.: The Java Tutorial, 3rd edn. The Java Series. Addison Wesley, Reading (2001), http:\/\/java.sun.com\/docs\/books\/tutorial\/index.html","edition":"3"},{"key":"12_CR4","unstructured":"Gong, L.: Java Security Architecture, JDK 1.2 (1998), http:\/\/java.sun.com\/products\/jdk\/1.2\/docs\/guide\/security\/spec\/security-%spec.doc.html"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Necula, G.C.: Proof-Carrying Code. In: Proceedings of the Twenty-Fourth ACM Symposium on Principles of Programming Languages, Paris, France, pp. 106\u2013119 (1997)","DOI":"10.1145\/263699.263712"},{"key":"12_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/3-540-68671-1_5","volume-title":"Mobile Agents and Security","author":"G.C. Necula","year":"1998","unstructured":"Necula, G.C., Lee, P.: Safe, Untrusted Agents Using Proof-Carrying Code. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol.\u00a01419, pp. 61\u201391. Springer, Heidelberg (1998)"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Morrisett, G., Walker, D., Crary, K., Glew, N.: From System F to Typed Assembly Language. In: Twenty-Fifth ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, San Diego, CA, USA, pp. 85\u201397 (1998)","DOI":"10.21236\/ADA358572"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Morrisett, G., Crary, K., Glew, N., Grossman, D., Samuels, R., Smith, F., Walker, D., Weirich, S., Zdancewic, S.: Talx86: A Realistic Typed Assembly Language. In: ACM SIGPLAN Workshop on Compiler Support for System Software, Atlanta, GA, USA, pp. 25\u201335 (1999)","DOI":"10.21236\/ADA358572"},{"key":"12_CR9","unstructured":"Kozen, D.: Efficient Code Certification. Technical Report TR98-1661, Cornell University (1998)"},{"key":"12_CR10","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1007\/s100090050043","volume":"2","author":"K. Havelund","year":"1999","unstructured":"Havelund, K., Pressburger, T.: Model Checking Java Programs Using Java Pathfinder. Software Tools for Technology Transfer\u00a02, 366\u2013381 (1999)","journal-title":"Software Tools for Technology Transfer"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Flanagan, C., Freund, S.N.: Type-Based Race Detection for Java. In: Proceedings of the ACM SIGPLAN 2000 conference on Programming language design and implementation, vol.\u00a035, pp. 219\u2013232 (2000)","DOI":"10.1145\/349299.349328"},{"key":"12_CR12","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1145\/349299.349315","volume-title":"Proceedings of the Conference on Programming Language Design and Implementation","author":"C. Colby","year":"2000","unstructured":"Colby, C., Lee, P., Necula, G.C., Blau, F., Plesko, M., Cline, K.: A Certifying Compiler for Java. In: Proceedings of the Conference on Programming Language Design and Implementation, Vancouver, Canada, pp. 95\u2013107. ACM Press, New York (2000), http:\/\/www.cs.berkeley.edu\/~necula\/pldi00b.ps.gz"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Yahav, E.: Verifying Safety Properties of Concurrent Java Programs Using 3- Valued Logic. In: Proceedings of the Twenty-Eighth ACM SIGPLAN-SIGACT symposium on Principles of programming languages, vol.\u00a028, pp. 27\u201340 (2001)","DOI":"10.1145\/373243.360206"},{"key":"12_CR14","unstructured":"IBM: Jikes Official Homepage (2002), http:\/\/oss.software.ibm.com\/developerworks\/opensource\/jikes\/"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Stirling, C.: Modal and Temporal Logics for Processes. Technical Report ECSLFCS-92-221, Laboratory for Foundations of Computer Science, Department of Computer Science, University of Edinburgh (1992)","DOI":"10.1093\/oso\/9780198537618.003.0005"},{"key":"12_CR16","unstructured":"JavaSoft: Security (1998), http:\/\/java.sun.com\/products\/jdk\/1.2\/docs\/guide\/security\/index.html"},{"key":"12_CR17","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1016\/0304-3975(82)90125-6","volume":"27","author":"D. Kozen","year":"1983","unstructured":"Kozen, D.: Results on the Propositional \u03bc-calculus. Theoretical Computer Science\u00a027, 333\u2013353 (1983)","journal-title":"Theoretical Computer Science"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Klaus Havelund, J.U.S.: Applying Model Checking in Software Verification. In: Proceedings of the Sixth International SPIN Workshop on Practical Aspects of Model Checking, Toulouse, France, pp. 216\u2013231 (1999)","DOI":"10.1007\/3-540-48234-2_17"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Park, D.Y.W., Stern, U., Skakkebaek, J.U., Dill, D.L.: Java Model Checking. In: Proceedings of Automated Software Engineering conference, Grenoble, France, pp. 253\u2013256 (2000)","DOI":"10.1109\/ASE.2000.873671"}],"container-title":["Lecture Notes in Computer Science","Formal Aspects of Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-40981-6_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,27]],"date-time":"2024-03-27T19:19:49Z","timestamp":1711567189000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-40981-6_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540206934","9783540409816"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-40981-6_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}