{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T15:21:54Z","timestamp":1720624914900},"reference-count":27,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2002,5,1]],"date-time":"2002-05-01T00:00:00Z","timestamp":1020211200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2013,7,29]],"date-time":"2013-07-29T00:00:00Z","timestamp":1375056000000},"content-version":"vor","delay-in-days":4107,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electronic Notes in Theoretical Computer Science"],"published-print":{"date-parts":[[2002,5]]},"DOI":"10.1016\/s1571-0661(04)80333-5","type":"journal-article","created":{"date-parts":[[2004,9,28]],"date-time":"2004-09-28T19:29:25Z","timestamp":1096399765000},"page":"1-16","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Portable Resource Control in Java"],"prefix":"10.1016","volume":"63","author":[{"given":"Walter","family":"Binder","sequence":"first","affiliation":[]},{"given":"Jarle G.","family":"Hulaas","sequence":"additional","affiliation":[]},{"given":"Alex","family":"Villaz\u00f3n","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S1571-0661(04)80333-5_NEWBIB1","series-title":"Seventh IEEE Workshop on Hot Topics in Operating Systems","article-title":"Drawing the red line in Java","author":"Back","year":"1999"},{"key":"10.1016\/S1571-0661(04)80333-5_NEWBIB2","doi-asserted-by":"crossref","unstructured":"G. Back, W. Hsieh, and J. Lepreau. Processes in KaffeOS: Isolation, resource management, and sharing in Java. In Proceedings of the Fourth Symposium on Operating Systems Design and Implementation (OSDI'2000), San Diego, CA, USA, Oct. 2000.","DOI":"10.21236\/ADA440101"},{"key":"10.1016\/S1571-0661(04)80333-5_NEWBIB3","unstructured":"G. Back, P. Tullmann, L. Stoller, W. Hsieh, and J. Lepreau. Techniques for the design of Java operating systems. In Proceedings of the 2000 USENIX Annual Technical Conference, San Diego, CA, June 2000."},{"key":"10.1016\/S1571-0661(04)80333-5_NEWBIB4","unstructured":"G. Back, P. Tullmann, L. Stoller, W. C. Hsieh, and J. Lepreau. Java operating systems: Design and implementation. Technical Report UUCS-98\u2013015, University of Utah, Department of Computer Science, Aug. 6, 1998."},{"key":"10.1016\/S1571-0661(04)80333-5_NEWBIB5","unstructured":"W. Binder. J-SEAL2 \ue4f8 A secure high-performance mobile agent system. In IAT'99 Workshop on Agents in Electronic Commerce, Hong Kong, Dec. 1999."},{"key":"10.1016\/S1571-0661(04)80333-5_NEWBIB6","doi-asserted-by":"crossref","unstructured":"W. Binder. Design and implementation of the J-SEAL2 mobile agent kernel. In The 2001 Symposium on Applications and the Internet (SAINT-2001), San Diego, CA, USA, Jan. 2001.","DOI":"10.1109\/SAINT.2001.905166"},{"key":"10.1016\/S1571-0661(04)80333-5_NEWBIB7","unstructured":"W. Binder, J. Hulaas, and A. Villaz\u00f3n. Resource control in J-SEAL2. Technical Report Cahier du CUI No. 124, University of Geneva, Oct. 2000. ftp:\/\/cui.unige.ch\/pub\/tios\/papers\/TR-124\ue4f82000.pdf."},{"key":"10.1016\/S1571-0661(04)80333-5_NEWBIB8","series-title":"The Real-Time Specification for Java","author":"Bollella","year":"2000"},{"key":"10.1016\/S1571-0661(04)80333-5_NEWBIB9","doi-asserted-by":"crossref","unstructured":"C. Bryce and J. Vitek. The JavaSeal mobile agent kernel. In First International Symposium on Agent Systems and Applications (ASA'99)\/Third International Symposium on Mobile Agents (MA'99), Palm Springs, CA, USA, Oct. 1999.","DOI":"10.1109\/ASAMA.1999.805397"},{"key":"10.1016\/S1571-0661(04)80333-5_NEWBIB10","doi-asserted-by":"crossref","unstructured":"G. Czajkowski and T. von Eicken. JRes: A resource accounting interface for Java. In Proceedings of the 13th Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA-98), volume 33, 10 of ACM SIGPLAN Notices, pages 21\u201335, New York, USA, Oct. 18\u201322 1998. ACM Press.","DOI":"10.1145\/286936.286944"},{"key":"10.1016\/S1571-0661(04)80333-5_NEWBIB11","unstructured":"F.-X. Le Louarn. JUM, a Java Usage Monitor. Web pages at http:\/\/www.iro.umontreal.ca\/~lelouarn\/jum.html."},{"key":"10.1016\/S1571-0661(04)80333-5_NEWBIB12","unstructured":"B. Ford, M. Hibler, J. Lepreau, R. McGrath, and P. Tullmann. Interface and execution models in the fluke kernel. In Proceedings of the Third Symposium on Operating Systems Design and Implementation (OSDI-99), pages 101\u2013116, Berkeley, CA, USA, Feb. 22\u201325 1999. Usenix Association."},{"key":"10.1016\/S1571-0661(04)80333-5_NEWBIB13","doi-asserted-by":"crossref","unstructured":"B. Ford and S. Susarla. CPU Inheritance Scheduling. In Usenix Association Second Symposium on Operating Systems Design and Implementation (OSDI), pages 91\u2013105, 1996.","DOI":"10.1145\/238721.238765"},{"key":"10.1016\/S1571-0661(04)80333-5_NEWBIB14","doi-asserted-by":"crossref","unstructured":"M. Godfrey, T. Mayr, P. Seshadri, and T. von Eicken. Secure and portable database extensibility. In Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD-98), volume 27, 2 of ACM SIGMOD Record, pages 390\u2013401, New York, USA, June 1\u20134 1998. ACM Press.","DOI":"10.1145\/276304.276339"},{"key":"10.1016\/S1571-0661(04)80333-5_NEWBIB15","unstructured":"J. Gosling, B. Joy, and G. L. Steele. The Java Language Specification. The Java Series. Addison-Wesley, Reading, MA, USA, 1st edition, 1996."},{"key":"10.1016\/S1571-0661(04)80333-5_NEWBIB16","unstructured":"J. Hulaas, L. Gannoune, J. Francioli, S. Chachkov, F. Sch\u00fctz, and J. Harms. Electronic commerce of internet domain names using mobile agents. In Proceedings of the Second International Conference on Telecommunications and Electronic Commerce (ICTEC'99), Nashville, TN, USA, Oct. 1999."},{"key":"10.1016\/S1571-0661(04)80333-5_NEWBIB17","series-title":"The Java Virtual Machine Specification","author":"Lindholm","year":"1999"},{"key":"10.1016\/S1571-0661(04)80333-5_NEWBIB18","unstructured":"L. Moreau and C. Queinnec. Design and semantics of Quantum: a language to control resource consumption in distributed computing. In Usenix Conference on Domain-Specific Languages (DSL'97), pages 183\u2013197, Santa-Barbara, CA, USA, Oct. 1997."},{"issue":"2","key":"10.1016\/S1571-0661(04)80333-5_NEWBIB19","doi-asserted-by":"crossref","DOI":"10.1007\/BF00365318","article-title":"Java for real-time","volume":"11","author":"Nilsen","year":"1996","journal-title":"Real-Time Systems Journal"},{"issue":"1","key":"10.1016\/S1571-0661(04)80333-5_NEWBIB20","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1147\/sj.391.0175","article-title":"Overview of the IBM Java Just-in-Time compiler","volume":"39","author":"Suganuma","year":"2000","journal-title":"IBM Systems Journal"},{"key":"10.1016\/S1571-0661(04)80333-5_NEWBIB21","unstructured":"Sun Microsystems, Inc. Java Virtual Machine Profiler Interface (JVMPI). Web pages at http:\/\/java.sun.com\/j2se\/1.3\/docs\/guide\/jvmpi\/index.html."},{"key":"10.1016\/S1571-0661(04)80333-5_NEWBIB22","doi-asserted-by":"crossref","unstructured":"N. Suri, J. M. Bradshaw, M. R. Breedy, P. T. Groth, G. A. Hill, R. Jeffers, T. S. Mitrovich, B. R. Pouliot, and D. S. Smith. NOMADS: toward a strong and safe mobile agent system. In C. Sierra, G. Maria, and J. S. Rosenschein, editors, Proceedings of the 4th International Conference on Autonomous Agents (AGENTS-00), pages 163\u2013164, NY, June 3\u20137 2000. ACM Press.","DOI":"10.1145\/336595.337103"},{"key":"10.1016\/S1571-0661(04)80333-5_NEWBIB23","doi-asserted-by":"crossref","unstructured":"C. F. Tschudin. Open resource allocation for mobile code. In Proceedings of The First Workshop on Mobile Agents, Berlin, Germany, Apr. 1997.","DOI":"10.1007\/3-540-62803-7_34"},{"key":"10.1016\/S1571-0661(04)80333-5_NEWBIB24","series-title":"Eighth ACM SIGOPS European Workshop","article-title":"Nested Java processes: OS structure for mobile code","author":"Tullmann","year":"1998"},{"key":"10.1016\/S1571-0661(04)80333-5_NEWBIB25","doi-asserted-by":"crossref","unstructured":"J. Vitek and G. Castagna. Seal: A framework for secure mobile computations. In Internet Programming Languages, 1999.","DOI":"10.1007\/3-540-47959-7_3"},{"key":"10.1016\/S1571-0661(04)80333-5_NEWBIB26","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1007\/3-540-48749-2_17","article-title":"J-Kernel: A capability-based operating system for Java","volume":"1603","author":"Von Eicken","year":"1999","journal-title":"Lecture Notes in Computer Science"},{"key":"10.1016\/S1571-0661(04)80333-5_NEWBIB27","unstructured":"T. Wilkinson. Kaffe - a Java virtual machine. Web pages at http:\/\/www.kaffe.org\/."}],"container-title":["Electronic Notes in Theoretical Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066104803335?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066104803335?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,2,3]],"date-time":"2019-02-03T12:22:56Z","timestamp":1549196576000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1571066104803335"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,5]]},"references-count":27,"alternative-id":["S1571066104803335"],"URL":"https:\/\/doi.org\/10.1016\/s1571-0661(04)80333-5","relation":{},"ISSN":["1571-0661"],"issn-type":[{"value":"1571-0661","type":"print"}],"subject":[],"published":{"date-parts":[[2002,5]]}}}