{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:34:05Z","timestamp":1725572045644},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540666820"},{"type":"electronic","value":"9783540479420"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/978-3-540-47942-0_5","type":"book-chapter","created":{"date-parts":[[2010,12,16]],"date-time":"2010-12-16T23:16:22Z","timestamp":1292541382000},"page":"39-53","source":"Crossref","is-referenced-by-count":2,"title":["Extending Erlang for Safe Mobile Code Execution"],"prefix":"10.1007","author":[{"given":"Lawrie","family":"Brown","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dan","family":"Sahlin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"issue":"5","key":"5_CR1","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1145\/249069.231402","volume":"31","author":"A.-R. Adl-Tabatabai","year":"1996","unstructured":"Adl-Tabatabai, A.-R., Langdale, G., Lucco, S., Wahbe, R.: Efficient and Language Independent Mobile Programs. SIGPLAN\u00a031(5), 127\u2013136 (1996)","journal-title":"SIGPLAN"},{"issue":"1","key":"5_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1093\/comjnl\/29.1.1","volume":"29","author":"M. Anderson","year":"1986","unstructured":"Anderson, M., Pose, R.D., Wallace, C.S.: A Password Capability System. The Computer Journal\u00a029(1), 1\u20138 (1986)","journal-title":"The Computer Journal"},{"key":"5_CR3","unstructured":"Armstrong, J.: Erlang - A Survey of the Language and its Industrial Applications. In: INAP 1996 - The 9th Exhibitions and Symposium on Industrial Applications of Prolog, Hino, Tokyo, Japan (October 1996), http:\/\/www.ericsson.se\/cslab\/erlang\/publications\/inap96.ps."},{"key":"5_CR4","volume-title":"Concurrent Programming in Erlang","author":"J. Armstrong","year":"1996","unstructured":"Armstrong, J., Virding, R., Wikstrom, C., Williams, M.: Concurrent Programming in Erlang, 2nd edn. Prentice Hall, Englewood Cliffs (1996), http:\/\/www.erlang.org\/download\/erlangbooktoc.html","edition":"2"},{"key":"5_CR5","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1145\/258948.258967","volume-title":"Proceedings of the ACM SIGPLAN International Conference on Functional Programming","author":"J. Armstrong","year":"1997","unstructured":"Armstrong, J.: The Development of Erlang. In: Proceedings of the ACM SIGPLAN International Conference on Functional Programming, pp. 196\u2013203. ACM, New York (1997)"},{"key":"5_CR6","volume-title":"The Java programming Language","author":"K. Arnold","year":"1998","unstructured":"Arnold, K., Gosling, J.: The Java programming Language, 2nd edn. Addison-Wesley, Reading (1998), 0201310066","edition":"2"},{"key":"5_CR7","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"M. Bellare","year":"1996","unstructured":"Bellare, M., Canetti, R., Krawczyk, H.: Keyed Hash Functions and Message Authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 1\u201315. Springer, Heidelberg (1996), http:\/\/www.research.ibm.com\/security\/keyed-md5.html"},{"key":"5_CR8","unstructured":"Brown, L.: Mobile Code Security. In: AUUG 1996 and Asia Pacific World Wide Web 2nd Joint Conference, AUUG, Sydney, Australia, pp. 46\u201355 (1996), http:\/\/www.adfa.edu.au\/~lpb\/papers\/mcode96.html"},{"key":"5_CR9","unstructured":"Brown, L.: SSErl - Prototype of a Safer Erlang. Technical Report CS04\/97, School of Computer Science, Australian Defence Force Academy, Canberra, Australia (November 1997), http:\/\/www.adfa.edu.au\/~lpb\/papers\/tr9704.html"},{"key":"5_CR10","unstructured":"Brown, L.: Custom Safety Policies in SSErl. Technical note, School of Computer Science, Australian Defence Force Academy, Canberra, Australia (June 1999), http:\/\/www.adfa.edu.au\/~lpb\/research\/sserl\/sspol99.html"},{"key":"5_CR11","unstructured":"Connolly, D.: Issues in the Development of Distributed Hypermedia Applications (December 1996), http:\/\/www.w3.org\/OOP\/HyperMediaDev"},{"key":"5_CR12","unstructured":"Connolly, D.: Mobile Code (December 1996), http:\/\/www.w3.org\/MobileCode\/"},{"key":"5_CR13","volume-title":"Proceedings IEEE Symposium on Security and Privacy","author":"D. Dean","year":"1996","unstructured":"Dean, D., Felten, E.W., Wallach, D.S.: Java Security: From Hotjava to Netscape and Beyond. In: Proceedings IEEE Symposium on Security and Privacy. IEEE, Los Alamitos (1996), http:\/\/www.cs.princeton.edu\/sip\/pub\/secure96.html"},{"issue":"6","key":"5_CR14","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/4236.735985","volume":"2","author":"B. Hashii","year":"1998","unstructured":"Hashii, B., Lal, M., Pandey, R., Samorodin, S.: Securing Systems Against External Programs. IEEE Internet Computing\u00a02(6), 35\u201345 (1998)","journal-title":"IEEE Internet Computing"},{"issue":"2","key":"5_CR15","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1093\/comjnl\/32.2.98","volume":"32","author":"J. Hughes","year":"1989","unstructured":"Hughes, J.: Why Functional Programming Matters. Computer Journal\u00a032(2), 98\u2013107 (1989), http:\/\/www.cs.chalmers.se\/~rjmh\/Papers\/whyfp.ps","journal-title":"Computer Journal"},{"key":"5_CR16","unstructured":"Jonsson, I., Naeser, G., Sahlin, D., et al.: Adapting Erlang for Secure Mobile Agents. In: Practical Applications of Intelligent Agents and Multi-Agents: PAAM 1997, London, UK (April 1997), http:\/\/www.ericsson.se\/cslab\/~dan\/reports\/paam97\/final\/paam97.ps"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Krawczyk, H., Bellare, M., Canetti, R.: HMAC: Keyed-Hashing for Message Authentication. Rfc 2104, IETF (February 1997)","DOI":"10.17487\/rfc2104"},{"key":"5_CR18","unstructured":"Leroy, X.: Objective CAML. Technical report, INRIA (1997), http:\/\/pauillac.inria.fr\/ocaml\/"},{"key":"5_CR19","volume-title":"Fourth International World Wide Web Conference","author":"S. Lucco","year":"1995","unstructured":"Lucco, S., Sharp, O., Wahbe, R.: Omniware: A Universal Substrate for Mobile Code. In: Fourth International World Wide Web Conference, MIT, Cambridge (1995), http:\/\/www.w3.org\/pub\/Conferences\/WWW4\/Papers\/165\/"},{"key":"5_CR20","volume-title":"Java Security: Hostile Applets, Holes, and Antidotes","author":"G. McGraw","year":"1997","unstructured":"McGraw, G., Felton, E.W.: Java Security: Hostile Applets, Holes, and Antidotes. Wiley, Chichester (1997), 047117842X"},{"key":"5_CR21","unstructured":"Naeser, G.: Your First Introduction to Safeerlang. Technical report, Dept. Computer Science, Uppsala University, Sweden (January 1997), ftp:\/\/ftp.csd.uu.se\/pub\/papers\/masters-theses\/0109-naeser.ps.gz"},{"key":"5_CR22","unstructured":"Oaks, S.: Java Security. O\u2019Reilly (1998), 1565924037"},{"key":"5_CR23","unstructured":"Ousterhout, J.K., Levy, J.Y., Welch, B.B.: The Safe-Tcl Security Model. Technical report, Sun Microsystems Laboratories, Mountain View, CA 94043-1100, USA (November 1996), http:\/\/www.sunlabs.com\/research\/tcl\/safeTcl.ps"},{"issue":"6","key":"5_CR24","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/4236.735984","volume":"2","author":"A.D. Rubin","year":"1998","unstructured":"Rubin, A.D., Gee Jr., D.E.: Mobile Code Security. IEEE Internet Computing\u00a02(6), 30\u201334 (1998)","journal-title":"IEEE Internet Computing"},{"key":"5_CR25","unstructured":"Sahlin, D.: The Concurrent Functional Programming Language Erlang - An Overview. In: Workshop on Multi-Paradigm Logic Programming, Joint Intl. Conf. and Symposium on Logic Programming, Bonn (1996), http:\/\/www.ericsson.se\/cslab\/~dan\/reports\/mplp\/web\/mplp.html"},{"key":"5_CR26","unstructured":"Systems, E.: Open Source Erlang Distribution (1999), http:\/\/www.erlang.org\/"},{"issue":"12","key":"5_CR27","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1145\/96267.96281","volume":"33","author":"A.S. Tanenbaum","year":"1990","unstructured":"Tanenbaum, A.S., van Renesse, R., van Staveren, H., Sharp, G.J., Mullender, S.J., Jansen, J., van Rossum, G.: Experences with the Amoeba Distributed Operating System. Communications of the ACM\u00a033(12), 46\u201363 (1990)","journal-title":"Communications of the ACM"},{"issue":"3","key":"5_CR28","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1145\/262009.262010","volume":"29","author":"T. Thorn","year":"1997","unstructured":"Thorn, T.: Programming Languages for Mobile Code. ACM Computing Surveys\u00a029(3), 213\u2013239 (1997)","journal-title":"ACM Computing Surveys"},{"key":"5_CR29","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1145\/268998.266668","volume-title":"Proceedings of the Symposium on Operating Systems Principles","author":"D.S. Wallach","year":"1997","unstructured":"Wallach, D.S., Balfanz, D., Dean, D., Felten, E.W.: Extensible Security Architectures for Java. In: Proceedings of the Symposium on Operating Systems Principles, pp. 116\u2013128. ACM, New York (1997)"},{"key":"5_CR30","unstructured":"Wikstrom, C.: Distributed Programming in Erlang. In: PASCO 1994 - First International Symposium on Parallel Symbolic Computation (September 1994), http:\/\/www.ericsson.se\/cslab\/erlang\/publications\/dist-erlang.ps"},{"key":"5_CR31","volume-title":"Fourth International World Wide Web Conference","author":"F. Yellin","year":"1995","unstructured":"Yellin, F.: Low Level Security in Java. In: Fourth International World Wide Web Conference. MIT, Cambridge (1995), http:\/\/www.w3.org\/pub\/Conferences\/WWW4\/Papers\/197\/40.html"}],"container-title":["Lecture Notes in Computer Science","Information and Communication Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-47942-0_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,4]],"date-time":"2023-06-04T10:44:39Z","timestamp":1685875479000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-47942-0_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540666820","9783540479420"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-47942-0_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1999]]}}}