{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T20:47:32Z","timestamp":1760042852354},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642370359"},{"type":"electronic","value":"9783642370366"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37036-6_1","type":"book-chapter","created":{"date-parts":[[2013,2,18]],"date-time":"2013-02-18T19:35:55Z","timestamp":1361216155000},"page":"1-20","source":"Crossref","is-referenced-by-count":12,"title":["Distributed Electronic Rights in JavaScript"],"prefix":"10.1007","author":[{"given":"Mark S.","family":"Miller","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tom","family":"Van Cutsem","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bill","family":"Tulloh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Szabo, N.: Formalizing and securing relationships on public networks. First Monday 2(9) (1997)","DOI":"10.5210\/fm.v2i9.548"},{"key":"1_CR2","unstructured":"Tribble, E.D., Miller, M.S., Hardy, N., Krieger, D.: Joule: Distributed Application Foundations. Technical Report ADd03.4P, Agorics Inc., Los Altos (December 1995), erights.org\/history\/joule\/"},{"key":"1_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/3-540-45472-1_24","volume-title":"Financial Cryptography","author":"M.S. Miller","year":"2001","unstructured":"Miller, M.S., Morningstar, C., Frantz, B.: Capability-Based Financial Instruments. In: Frankel, Y. (ed.) FC 2000. LNCS, vol.\u00a01962, pp. 349\u2013378. Springer, Heidelberg (2001), www.erights.org\/elib\/capability\/ode\/index.html"},{"key":"1_CR4","unstructured":"Close, T.: Waterken Server: capability-based security for the Web (2004), waterken.sourceforge.net"},{"key":"1_CR5","unstructured":"Close, T.: web_send, waterken.sourceforge.net\/web_send\/"},{"key":"1_CR6","first-page":"3","volume-title":"Proceedings of the 2012 USENIX Conference on Annual Technical Conference, USENIX ATC 2012","author":"S. Yoo","year":"2012","unstructured":"Yoo, S., Killian, C., Kelly, T., Cho, H.K., Plite, S.: Composable reliability for asynchronous systems. In: Proceedings of the 2012 USENIX Conference on Annual Technical Conference, USENIX ATC 2012, p. 3. USENIX Association, Berkeley (2012)"},{"key":"1_CR7","unstructured":"Miller, M.S.: Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control. PhD thesis, Johns Hopkins University, Baltimore, Maryland, USA (May 2006)"},{"key":"1_CR8","unstructured":"Mettler, A.: Language and Framework Support for Reviewably-Secure Software Systems. PhD thesis, EECS Department, University of California, Berkeley (December 2012)"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Taly, A., Erlingsson, U., Mitchell, J.C., Miller, M.S., Nagra, J.: Automated analysis of security-critical javascript apis. In: 2011 IEEE Symposium on Security and Privacy (SP), pp. 363\u2013378. IEEE (2011)","DOI":"10.1109\/SP.2011.39"},{"key":"1_CR10","unstructured":"Jones, A.K.: Protection in Programmed Systems. PhD thesis, Department of Computer Science, Carnegie-Mellon University (June 1973)"},{"key":"1_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/11580850_12","volume-title":"Trustworthy Global Computing","author":"M.S. Miller","year":"2005","unstructured":"Miller, M.S., Tribble, E.D., Shapiro, J.: Concurrency Among Strangers: Programming in E as Plan Coordination. In: De Nicola, R., Sangiorgi, D. (eds.) TGC 2005. LNCS, vol.\u00a03705, pp. 195\u2013229. Springer, Heidelberg (2005)"},{"key":"1_CR12","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1145\/53990.54016","volume-title":"PLDI 1988: Proc. ACM SIGPLAN 1988 Conference on Programming Language Design and Implementation","author":"B. Liskov","year":"1988","unstructured":"Liskov, B., Shrira, L.: Promises: Linguistic Support for Efficient Asynchronous Procedure Calls in Distributed Systems. In: PLDI 1988: Proc. ACM SIGPLAN 1988 Conference on Programming Language Design and Implementation, pp. 260\u2013267. ACM Press, New York (1988)"},{"key":"1_CR13","unstructured":"Close, T.: Web-key: Mashing with permission. In: W2SP 2008 (2008)"},{"issue":"2","key":"1_CR14","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1111\/j.1745-6622.1995.tb00283.x","volume":"8","author":"M.C. Jensen","year":"1995","unstructured":"Jensen, M.C., Meckling, W.H.: Specific and general knowledge and organizational structure. Journal of Applied Corporate Finance\u00a08(2), 4\u201318 (1995)","journal-title":"Journal of Applied Corporate Finance"},{"key":"1_CR15","unstructured":"Steiner, H.: An Essay on Rights. Wiley-Blackwell (1994)"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Smith, H.E.: Exclusion versus governance: two strategies for delineating property rights. Journal of Legal Studies 31 (2002)","DOI":"10.1086\/344529"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Ostrom, E.: Governing the Commons: The Evolution of Institutions for Collective Action. Cambridge University Press (1990)","DOI":"10.1017\/CBO9780511807763"},{"key":"1_CR18","unstructured":"Hayek, F.A.: Law, Legislation and Liberty. Rules and Order, vol.\u00a01. University of Chicago Press (1973)"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Hardy, N.: The Confused Deputy. Operating Systems Review (October 1988)","DOI":"10.1145\/54289.871709"},{"key":"1_CR20","first-page":"371","volume":"45","author":"A. Mossoff","year":"2003","unstructured":"Mossoff, A.: What is property-putting the pieces back together. Arizona Law Review\u00a045, 371 (2003)","journal-title":"Arizona Law Review"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Epstein, R.A.: Simple Rules for a Complex World. Harvard University Press (1995)","DOI":"10.4159\/9780674036567"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Fox, D.: Property rights in money. Oxford University Press (2008)","DOI":"10.1093\/oso\/9780198299455.001.0001"},{"key":"1_CR23","doi-asserted-by":"publisher","first-page":"269","DOI":"10.2307\/1122705","volume":"86","author":"R.E. Barnett","year":"1986","unstructured":"Barnett, R.E.: A consent theory of contract. Columbia Law Review\u00a086, 269 (1986)","journal-title":"Columbia Law Review"}],"container-title":["Lecture Notes in Computer Science","Programming Languages and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37036-6_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T04:45:40Z","timestamp":1714970740000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37036-6_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642370359","9783642370366"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37036-6_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}