{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T12:10:08Z","timestamp":1704111008314},"reference-count":27,"publisher":"Elsevier BV","issue":"17","license":[{"start":{"date-parts":[[2000,11,1]],"date-time":"2000-11-01T00:00:00Z","timestamp":973036800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[2000,11]]},"DOI":"10.1016\/s0140-3664(00)00245-0","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T20:56:47Z","timestamp":1027630607000},"page":"1594-1605","source":"Crossref","is-referenced-by-count":1,"title":["On object initialization in the Java bytecode"],"prefix":"10.1016","volume":"23","author":[{"given":"S","family":"Doyon","sequence":"first","affiliation":[]},{"given":"M","family":"Debbabi","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0140-3664(00)00245-0_BIB1","series-title":"The Java Virtual Machine Specification. Java Series","author":"Lindholm","year":"1996"},{"key":"10.1016\/S0140-3664(00)00245-0_BIB2","doi-asserted-by":"crossref","unstructured":"F. Yellin, Low level security in Java. In Fourth International World Wide Web Conference, MIT, December 1995. http:\/\/www.w3.org\/pub\/Conferences\/www4\/Papers\/197\/40.html.","DOI":"10.1145\/3592626.3592656"},{"key":"10.1016\/S0140-3664(00)00245-0_BIB3","doi-asserted-by":"crossref","unstructured":"S.N. Freund, J.C. Mitchell, A type system for object initialization in the Java bytecode language, Proceedings of the ACM Conference on Object-Oriented Programming: Systems, Languages and Applications, OOPSLA'98, Vancouver, BC, Canada, October 1998.","DOI":"10.1145\/286936.286972"},{"key":"10.1016\/S0140-3664(00)00245-0_BIB4","series-title":"A type system for Java bytecode subroutines","author":"Stata","year":"1998"},{"key":"10.1016\/S0140-3664(00)00245-0_BIB5","series-title":"The Java Language Specification. Java Series","author":"Gosling","year":"1996"},{"key":"10.1016\/S0140-3664(00)00245-0_BIB6","series-title":"The Java Tutorial: Object-Oriented Programming for the Internet (Java Series)","author":"Campione","year":"1998"},{"key":"10.1016\/S0140-3664(00)00245-0_BIB7","unstructured":"JDK 1.2 documentation, 1998. http:\/\/java.sun.com\/products\/jdk\/1.2\/docs\/index.html."},{"key":"10.1016\/S0140-3664(00)00245-0_BIB8","series-title":"Java Virtual Machine","author":"Meyer","year":"1997"},{"key":"10.1016\/S0140-3664(00)00245-0_BIB9","doi-asserted-by":"crossref","unstructured":"J. Meyer, Jasmin \u2014 Java assembler interface, 1997. http:\/\/cat.nyu.edu\/meyer\/jasmin.","DOI":"10.1007\/978-1-4757-9570-7_1"},{"key":"10.1016\/S0140-3664(00)00245-0_BIB10","doi-asserted-by":"crossref","unstructured":"A. Goldberg, A specification of Java loading and bytecode verification. Kestrel University, 1997. http:\/\/www.kestrel.edu\/~goldberg.","DOI":"10.1145\/288090.288104"},{"key":"10.1016\/S0140-3664(00)00245-0_BIB11","unstructured":"V. Saraswat, The Java bytecode verification problem. AT&T Research, 1997. http:\/\/www.research.att.com\/~vj\/bcv.html."},{"key":"10.1016\/S0140-3664(00)00245-0_BIB12","unstructured":"Kimera: a Java system architecture, 1997. http:\/\/kimera.cs.washington.edu\/."},{"key":"10.1016\/S0140-3664(00)00245-0_BIB13","unstructured":"Q. Zhenyu, A formal specification of a large subset of Java(tm) virtual machine instructions. Universitat Bremen, September 1997. http:\/\/www.informatik.uni-bremen.de\/~qian\/abs-fsjvm.html."},{"key":"10.1016\/S0140-3664(00)00245-0_BIB14","doi-asserted-by":"crossref","unstructured":"S. Drossopolou, S. Eisenbach, Java is type safe \u2014 probably, Proceedings of the 11th European Conference on Object-Oriented Programming, Jyv\u00e4skyl\u00e4, Finland, June 9\u201313 1997. Lecture Notes in Computer Science, LNCS.","DOI":"10.1007\/BFb0053388"},{"key":"10.1016\/S0140-3664(00)00245-0_BIB15","series-title":"Java-light is type-safe \u2014 definitely","author":"Nipkow","year":"1998"},{"key":"10.1016\/S0140-3664(00)00245-0_BIB16","unstructured":"R.M. Cohen, Defensive Java Virtual Machine. Computational Logic Inc., University of Texas at Austin, USA, 1997. http:\/\/www.cli.com\/software\/djvm\/."},{"key":"10.1016\/S0140-3664(00)00245-0_BIB17","unstructured":"Secure internet programming: Home page, Princeton University, NJ, USA, 1998. http:\/\/www.cs.princeton.edu\/sip."},{"key":"10.1016\/S0140-3664(00)00245-0_BIB18","doi-asserted-by":"crossref","unstructured":"D. Dean, The security of static typing with dynamic linking, Fourth ACM Conference on Computer and Communications Security, Zurich, April 1\u20134, 1997, pp. 18\u201327. http:\/\/www.cs.princeton.edu\/sip\/pub\/ccs4.html.","DOI":"10.1145\/266420.266428"},{"key":"10.1016\/S0140-3664(00)00245-0_BIB19","doi-asserted-by":"crossref","unstructured":"D.S. Wallach, D. Balfanz, D. Dean, E.W. Felten, Extensible security architectures for Java. Technical Report 546-97, Department of Computer Science, Princeton University, April 1997.","DOI":"10.1145\/268998.266668"},{"key":"10.1016\/S0140-3664(00)00245-0_BIB20","doi-asserted-by":"crossref","unstructured":"D.S. Wallach, E.W. Felten, Understanding Java stack inspection, Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA, May 1998. IEEE.","DOI":"10.1109\/SECPRI.1998.674823"},{"key":"10.1016\/S0140-3664(00)00245-0_BIB21","unstructured":"I. Shin, Hostile applet summary, 1997. Muri project. http:\/\/theory.stanford.edu\/muri\/hostile.html."},{"key":"10.1016\/S0140-3664(00)00245-0_BIB22","unstructured":"L. Gong, M. Mueller, H. Prafullchandra, R. Schemers, Going beyond the sandbox: an overview of the new security architecture in the Java development kit 1.2, Proceedings of the USENIX Symposium on Internet Technologies and Systems, Monterey, CA, USA, December 1997, pp. 103\u2013112."},{"key":"10.1016\/S0140-3664(00)00245-0_BIB23","unstructured":"L. Gong, R. Schemers, Implementing protection domains in the Java development kit 1.2, Proceedings of the Internet Society Symposium on Network and Distributed System Security, San Diego, CA, March 1998, pp. 125\u2013134. http:\/\/java.sun.com\/people\/gong\/papers\/jdk12impl.ps.gz."},{"key":"10.1016\/S0140-3664(00)00245-0_BIB24","series-title":"Internet Beseiged: Countering Cyberspace Scofflaws","first-page":"241","article-title":"Web browsers and beyond","author":"Dean","year":"1997"},{"key":"10.1016\/S0140-3664(00)00245-0_BIB25","unstructured":"L. Gong, Java security architecture, Sun Microsystems Inc., March 1998. http:\/\/java.sun.com\/products\/jdk\/1.2\/docs\/guide\/security\/index.html."},{"key":"10.1016\/S0140-3664(00)00245-0_BIB26","series-title":"Java Security: Hostile Applets, Holes & Antidotes","author":"McGraw","year":"1996"},{"key":"10.1016\/S0140-3664(00)00245-0_BIB27","series-title":"Java Security","author":"Oaks","year":"1998"}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366400002450?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366400002450?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T11:30:33Z","timestamp":1704108633000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366400002450"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,11]]},"references-count":27,"journal-issue":{"issue":"17","published-print":{"date-parts":[[2000,11]]}},"alternative-id":["S0140366400002450"],"URL":"https:\/\/doi.org\/10.1016\/s0140-3664(00)00245-0","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[2000,11]]}}}