{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,3]],"date-time":"2025-04-03T11:44:10Z","timestamp":1743680650972},"reference-count":47,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/dance.2002.1003496","type":"proceedings-article","created":{"date-parts":[[2003,6,25]],"date-time":"2003-06-25T20:30:39Z","timestamp":1056573039000},"page":"224-237","source":"Crossref","is-referenced-by-count":5,"title":["A secure PLAN (extended version)"],"prefix":"10.1109","author":[{"given":"M.","family":"Hicks","sequence":"first","affiliation":[]},{"given":"A.D.","family":"Keromytis","sequence":"additional","affiliation":[]},{"given":"J.M.","family":"Smith","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/263699.263712"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/OPNARC.2001.916839"},{"key":"ref33","article-title":"Path MTU Discovery","author":"mogul","year":"1990","journal-title":"Internet RFC 1191"},{"key":"ref32","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/2319.001.0001","author":"milner","year":"1997","journal-title":"The Definition of Standard ML (Revised)"},{"key":"ref31","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-48507-0_3","article-title":"RCANE: A resource controlled framework for active network services","author":"menage","year":"1999","journal-title":"Proceedings of the First International Workshop on Active Networks"},{"key":"ref30","first-page":"271","article-title":"The Safe-Tcl security model","author":"levy","year":"1998","journal-title":"Proceedings of the 1998 USENIX Annual Technical Conference"},{"year":"1998","key":"ref37","article-title":"Security architecture for active nets"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2001.916685"},{"key":"ref35","article-title":"Mobile Code Security Techniques","author":"moore","year":"1998","journal-title":"Technical Report MS-CIS-98&#x2013;28"},{"key":"ref34","article-title":"Scout: A communications-oriented operating system","author":"montz","year":"1994","journal-title":"Technical Report"},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-48749-2_8","article-title":"The role of trust management in distributed systems security","author":"blaze","year":"1999","journal-title":"Secure internet Programming"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/238721.238781"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/195792.195795"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/325694.325716"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/BF00124891"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503301"},{"journal-title":"The Java Language Specification","year":"1996","author":"gosling","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1002\/1097-024X(200012)30:15<1609::AID-SPE334>3.0.CO;2-5"},{"key":"ref18","first-page":"259","article-title":"Implementing Multiple Protection Domains in Java","author":"hawblitzel","year":"1998","journal-title":"Proceedings of the 1998 USENIX Annual Technical Conference"},{"key":"ref19","article-title":"PLAN system security","author":"hicks","year":"1998","journal-title":"Technical Report MS-CIS-98&#x2013;25"},{"key":"ref28","article-title":"Institut National de Recherche en Informatique et Automatique (INRIA)","author":"leroy","year":"2000","journal-title":"The Objective Caml System Release 3 00"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/65.690960"},{"key":"ref27","article-title":"HMAC: Keyed-hashing for message authentication. Technical report","author":"krawczyk","year":"1997","journal-title":"IETF RFC 2104"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/35.833566"},{"key":"ref6","first-page":"343","article-title":"Scalable resource control in active networks","author":"anagnostakis","year":"2000","journal-title":"Proceedings of the Second International Working Conference on Active Networks"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/49.536480"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2001.6596875"},{"key":"ref8","article-title":"Processes in KaffeOS: Isolation, resource management, and sharing in Java","author":"back","year":"2000","journal-title":"Proceedings of the 4th USENIX Symposium on Operating Systems Design and Implementation"},{"key":"ref7","first-page":"59","article-title":"DHCP++: Applying an efficient implementation method for fail-stop cryptographic protocols","author":"arbaugh","year":"1998","journal-title":"Proceedings of Global Internet (GlobeCom) '98"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/65.690959"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/224056.224077"},{"journal-title":"ALIEN A Generalized Computing Model of Active Networks","year":"1998","author":"alexander","key":"ref1"},{"key":"ref46","first-page":"64","author":"wetherall","year":"1999","journal-title":"Active network vision and reality lessons from a capsule-based system In 17th Symp on Operating Systems Principles (SOSP'99)"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/289423.289431"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1998.674823"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1999.751668"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/OPNARC.1998.662048"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/978-3-540-48507-0_28","article-title":"A secure PLAN","author":"hicks","year":"1999","journal-title":"Proceedings of the First International Workshop on Active Networks"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/49.917708"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/DANCE.2002.1003481"},{"article-title":"The design and implementation of a highperformance active network node","year":"1998","author":"nygren","key":"ref41"},{"key":"ref23","first-page":"134","article-title":"Compiling PLAN to SNAP","author":"hicks","year":"2001","journal-title":"Proceedings of the Third International Working Conference on Active Networks"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/49.917710"},{"key":"ref26","article-title":"Security architecture for the internet protocol","author":"kent","year":"1998","journal-title":"Technical Report RFC 2401 IETF"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/35.568214"},{"key":"ref25","article-title":"Part of PLAN 3.2 documentation","author":"hicks","year":"2001","journal-title":"PLAN Security Guide"}],"event":{"name":"DARPA Active Networks Conference and Exposition","acronym":"DANCE-02","location":"San Francisco, CA, USA"},"container-title":["Proceedings DARPA Active Networks Conference and Exposition"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/7864\/21659\/01003496.pdf?arnumber=1003496","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,23]],"date-time":"2020-03-23T21:19:41Z","timestamp":1584998381000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1003496\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/dance.2002.1003496","relation":{},"subject":[]}}