{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T05:07:51Z","timestamp":1733461671829,"version":"3.30.1"},"reference-count":41,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2001,6,1]],"date-time":"2001-06-01T00:00:00Z","timestamp":991353600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2001,6]]},"DOI":"10.1016\/s1389-1286(01)00154-2","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T20:55:14Z","timestamp":1027630514000},"page":"101-114","source":"Crossref","is-referenced-by-count":4,"title":["SafetyNet: A language-based approach to programmable networks"],"prefix":"10.1016","volume":"36","author":[{"given":"Ian","family":"Wakeman","sequence":"first","affiliation":[]},{"given":"Alan","family":"Jeffrey","sequence":"additional","affiliation":[]},{"given":"Tim","family":"Owen","sequence":"additional","affiliation":[]},{"given":"Damyan","family":"Pepper","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"4","key":"10.1016\/S1389-1286(01)00154-2_BIB1","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1109\/90.413212","article-title":"Link-sharing and resource management models for packet networks","volume":"3","author":"Floyd","year":"1995","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"10.1016\/S1389-1286(01)00154-2_BIB2","doi-asserted-by":"crossref","unstructured":"D.D. Clark, S. Shenker, L. Zhang, Supporting realtime applications in an integrated services packet network architecture and mechanism, in: Proceedings of SIGCOMM'92, 1992","DOI":"10.1145\/144179.144199"},{"key":"10.1016\/S1389-1286(01)00154-2_BIB3","doi-asserted-by":"crossref","unstructured":"D.D. Clark, W. Fang, Explicit allocation of best effort packet delivery service, IEEE ACM Transactions on Networking 6 (4) (1998) 362\u2013373","DOI":"10.1109\/90.720870"},{"key":"10.1016\/S1389-1286(01)00154-2_BIB4","doi-asserted-by":"crossref","unstructured":"L. Zhang et al., Rsvp: A new resource reservation protocol, IEEE Network, September 1993","DOI":"10.1109\/65.238150"},{"key":"10.1016\/S1389-1286(01)00154-2_BIB5","doi-asserted-by":"crossref","unstructured":"A. Lazar, K.-S. Lim, F. Marconcini, Realising a foundation for programmability of atm networks with the binding architecture, IEEE Journal on Selected Areas in Communications, September 1996","DOI":"10.1109\/49.536363"},{"key":"10.1016\/S1389-1286(01)00154-2_BIB6","doi-asserted-by":"crossref","unstructured":"E. Amir, S. McCanne, R. Katz, An active service framework and its application to realtime multimedia transcoding, in: Proceedings of SIGCOMM'98, Vancouver, BC, September 1998","DOI":"10.1145\/285237.285281"},{"year":"1998","series-title":"Programming and Deploying Java Mobile Agents with Aglets","author":"Lange","key":"10.1016\/S1389-1286(01)00154-2_BIB7"},{"key":"10.1016\/S1389-1286(01)00154-2_BIB8","unstructured":"A. Ghosh, M. Fry, Application level active networking, in: Hipparch Workshop, UCL, London, June 1998"},{"key":"10.1016\/S1389-1286(01)00154-2_BIB9","doi-asserted-by":"crossref","unstructured":"D.L. Tennenhouse, D.J. Wetherall, Towards an active network architecture, Computer Communication Review, April 1996","DOI":"10.1145\/231699.231701"},{"key":"10.1016\/S1389-1286(01)00154-2_BIB10","unstructured":"P. Bernadat, D. Lambright, F. Travostino, Towards a resource-safe Java for service guarantees in uncooperative environments, in: IEEE Workshop on Programming Languages for Realtime Industrial Applications, September 1998"},{"key":"10.1016\/S1389-1286(01)00154-2_BIB11","doi-asserted-by":"crossref","unstructured":"B. Bershad, S. Savage, P. Pardyak, E.G. Sirer, D. Becker, M. Fiuczynski, C. Chambers, S. Eggers, Extensibility, safety and performance in the spin operating system, in: Proceedings of the 15th ACM Symposium on Operating System Principles (SOSP-15), Copper Mountain, CO, 1996, pp. 267\u2013328","DOI":"10.1145\/224056.224077"},{"key":"10.1016\/S1389-1286(01)00154-2_BIB12","doi-asserted-by":"crossref","unstructured":"S. Alexander, S. Nettles, M. Shaw, J. Smith, Active bridging, in: Proceedings of SIGCOMM'97, Cannes, France, August 1997","DOI":"10.1145\/263105.263149"},{"key":"10.1016\/S1389-1286(01)00154-2_BIB13","unstructured":"M. McIlhagga, I. Wakeman, A. Ormsby, Signalling in a component based world, in: Proceedings of the First IEEE Open Architectures for Signalling, San Francisco, CA, April 1998"},{"key":"10.1016\/S1389-1286(01)00154-2_BIB14","doi-asserted-by":"crossref","unstructured":"M. McIlhagga, A. Light, I. Wakeman, Towards a design methodology for adaptive applications, in: Fourth ACM\/IEEE International Conference on Mobile Computing and Networking (MobiCom'98), October 1998","DOI":"10.1145\/288235.288270"},{"key":"10.1016\/S1389-1286(01)00154-2_BIB15","doi-asserted-by":"crossref","unstructured":"G. Kiczales, Beyond the black box: open implementation, IEEE Software, January 1996","DOI":"10.1109\/52.476280"},{"key":"10.1016\/S1389-1286(01)00154-2_BIB16","doi-asserted-by":"crossref","unstructured":"D.S. Alexander, W.A. Arbaugh, M.W. Hicks, P. Kakkar, A.D. Keromytis, J.T. Moore, C.A. Gunter, S.M. Nettles, J.M. Smith, The switchware active network architecture, IEEE Network, Special Issue on Active and Controllable Networks, 12 (3) (1998) 29\u201336","DOI":"10.1109\/65.690959"},{"key":"10.1016\/S1389-1286(01)00154-2_BIB17","unstructured":"A. Jeffrey, A distributed object calculus, in: Proceedings of the ACM SIGPLAN Workshop Foundations of Object Oriented Languages 2000"},{"key":"10.1016\/S1389-1286(01)00154-2_BIB18","doi-asserted-by":"crossref","unstructured":"G. Bracha, M. Odersky, D. Stoutamire, P. Wadler, Making the future safe for the past: adding genericity to the Java programming language, in: OOPSLA'98, Vancouver, BC, October 1998","DOI":"10.1145\/286936.286957"},{"key":"10.1016\/S1389-1286(01)00154-2_BIB19","doi-asserted-by":"crossref","unstructured":"M. Odersky, P. Wadler, Pizza into Java: translating theory into practice, in: Proceedings of the 24th ACM Symposium on Principles of Programming Languages, Paris, January 1997","DOI":"10.1145\/263699.263715"},{"year":"1994","series-title":"Design Patterns: Elements of Reusable Object-Oriented Software","author":"Gamma","key":"10.1016\/S1389-1286(01)00154-2_BIB20"},{"key":"10.1016\/S1389-1286(01)00154-2_BIB21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/0304-3975(87)90045-4","article-title":"Linear logic","volume":"50","author":"Girard","year":"1987","journal-title":"Theoretical Computer Science"},{"key":"10.1016\/S1389-1286(01)00154-2_BIB22","doi-asserted-by":"crossref","unstructured":"N. Benton, G. Bierman, V. de Paiva, M. Hyland, A term calculus for intuitionistic linear logic, in: Proceedings of the International Conference on Typed Lambda Calculi and Applications, Lecture Notes in Computer Science, vol. 664, Springer, Berlin, 1993","DOI":"10.1007\/BFb0037099"},{"key":"10.1016\/S1389-1286(01)00154-2_BIB23","doi-asserted-by":"crossref","unstructured":"D.J. Wetherall, J. Guttag, D.L. Tennenhouse, Ants: a toolkit for building and dynamically deploying network protocols, in: Proceedings of first IEEE Conference on Open Architectures for Signalling, San Francisco, CA, April 1998","DOI":"10.1109\/OPNARC.1998.662048"},{"issue":"1","key":"10.1016\/S1389-1286(01)00154-2_BIB24","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1023\/A:1018740018601","article-title":"A tree-based alternative to Java byte-codes","volume":"27","author":"Kistler","year":"1999","journal-title":"International Journal of Parallel Programming"},{"key":"10.1016\/S1389-1286(01)00154-2_BIB25","doi-asserted-by":"crossref","unstructured":"P. Menage, Rcane: a resource controlled framework for active network services, in: S. Covaci (Ed.), Active Networks \u2013 Proceedings of IWAN 99, Lecture Notes on Computer Science, vol. 1653, Springer, Berlin, June 1999","DOI":"10.1007\/978-3-540-48507-0_3"},{"key":"10.1016\/S1389-1286(01)00154-2_BIB26","doi-asserted-by":"crossref","unstructured":"G. Hjalmtysson, The pronto platform: a flexible toolkit for programming networks using a commodity operating system, in: Third IEEE Conference on Open Arhcitectures and Network Programming, Tel Aviv, Israel, March 2000","DOI":"10.1109\/OPNARC.2000.828137"},{"key":"10.1016\/S1389-1286(01)00154-2_BIB27","doi-asserted-by":"crossref","unstructured":"S. Liang, G. Bracha, Dynamic class loading in the java virtual machine, in: OOPSLA'98, Vancouver, BC, October 1998","DOI":"10.1145\/286936.286945"},{"issue":"2","key":"10.1016\/S1389-1286(01)00154-2_BIB28","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1006\/inco.1996.2613","article-title":"Region-based memory management","volume":"132","author":"Tofte","year":"1997","journal-title":"Information and Computation"},{"key":"10.1016\/S1389-1286(01)00154-2_BIB29","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1016\/0890-5401(91)90052-4","article-title":"Notions of computation and monad","volume":"93","author":"Moggi","year":"1991","journal-title":"Information and Computation"},{"key":"10.1016\/S1389-1286(01)00154-2_BIB30","doi-asserted-by":"crossref","unstructured":"P. Wadler, Comprehending monads, in: Proceedings of the 1990 ACM Conference on Lisp and Functional Programming, 1990, pp. 61\u201378","DOI":"10.1145\/91556.91592"},{"key":"10.1016\/S1389-1286(01)00154-2_BIB31","article-title":"Premonoidal categories and notions of computation","author":"Power","year":"1999","journal-title":"Mathematical Structures in Computer Science"},{"key":"10.1016\/S1389-1286(01)00154-2_BIB32","unstructured":"P. Selinger, Control categories: an axiomatic approach to the semantics of control in functional languages, Presented at MFPS '98, London, 1998"},{"issue":"1","key":"10.1016\/S1389-1286(01)00154-2_BIB33","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/0890-5401(92)90008-4","article-title":"A calculus of mobile processes","volume":"100","author":"Milner","year":"1992","journal-title":"Information and Computation"},{"key":"10.1016\/S1389-1286(01)00154-2_BIB34","doi-asserted-by":"crossref","unstructured":"A. Gordon, L. Cardelli, Mobile ambients, in: Proceedings of the FoSSaCS '98, Lecture Notes in Computer Science, Springer, Berlin, 1998","DOI":"10.1007\/BFb0053547"},{"key":"10.1016\/S1389-1286(01)00154-2_BIB35","unstructured":"P. Sewell, Global\/local subtyping for a distributed \u03c0-calculus, Technical Report 435, Computer Laboratory, University of Cambridge, 1997"},{"key":"10.1016\/S1389-1286(01)00154-2_BIB36","doi-asserted-by":"crossref","unstructured":"J. Riely, M. Hennessy, Distributed processes and location failures, Technical Report 2\/97, University of Sussex, 1997 (Also presented at ICALP '97)","DOI":"10.1007\/3-540-63165-8_203"},{"key":"10.1016\/S1389-1286(01)00154-2_BIB37","unstructured":"A. Gordon, M. Abadi, A calculus for cryptographic protocols: the spi calculus, Information and Computation (148) (1999) 1\u201370"},{"key":"10.1016\/S1389-1286(01)00154-2_BIB38","doi-asserted-by":"crossref","unstructured":"A.D. Gordon, A calculus for cryptographic protocols: the spi calculus, in: Proceedings of the ACM Conference on Computer and Communications Security, ACM, New York, 1997, pp. 36\u201347","DOI":"10.1145\/266420.266432"},{"key":"10.1016\/S1389-1286(01)00154-2_BIB39","unstructured":"A.D. Gordon, Nominal calculi for security and mobility, in: Proceedings of the DARPA Workshop on Foundations for Secure Mobile Code, 1997, pp. 10\u201314"},{"issue":"3","key":"10.1016\/S1389-1286(01)00154-2_BIB40","doi-asserted-by":"crossref","first-page":"528","DOI":"10.1145\/319301.319345","article-title":"From system F to typed assembly language","volume":"21","author":"Morrisett","year":"1999","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"10.1016\/S1389-1286(01)00154-2_BIB41","doi-asserted-by":"crossref","unstructured":"G.C. Necula, Proof carrying code, in: Proceedings of 24th Annual ACM SIGPLAN-SIGACT Symposium on Programming Languages (POPL'97), ACM, New York, 1997","DOI":"10.1145\/263699.263712"}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128601001542?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128601001542?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,12,5]],"date-time":"2024-12-05T09:40:25Z","timestamp":1733391625000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128601001542"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001,6]]},"references-count":41,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2001,6]]}},"alternative-id":["S1389128601001542"],"URL":"https:\/\/doi.org\/10.1016\/s1389-1286(01)00154-2","relation":{},"ISSN":["1389-1286"],"issn-type":[{"type":"print","value":"1389-1286"}],"subject":[],"published":{"date-parts":[[2001,6]]}}}