{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T16:18:05Z","timestamp":1732033085834},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1109\/dsn.2009.5270296","type":"proceedings-article","created":{"date-parts":[[2009,9,30]],"date-time":"2009-09-30T18:41:36Z","timestamp":1254336096000},"page":"544-553","source":"Crossref","is-referenced-by-count":42,"title":["I-JVM: a Java Virtual Machine for component isolation in OSGi"],"prefix":"10.1109","author":[{"given":"N.","family":"Geoffray","sequence":"first","affiliation":[]},{"given":"G.","family":"Thomas","sequence":"additional","affiliation":[]},{"given":"G.","family":"Muller","sequence":"additional","affiliation":[]},{"given":"P.","family":"Parrend","sequence":"additional","affiliation":[]},{"given":"S.","family":"Frenot","sequence":"additional","affiliation":[]},{"given":"B.","family":"Folliot","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"259","article-title":"implementing multiple protection domains in java","author":"hawblitzel","year":"1998","journal-title":"Proceedings of the USENIX Annual Technical Conference"},{"key":"35","first-page":"19","article-title":"a secure java virtual machine","author":"van doorn","year":"2000","journal-title":"Proceedings of the USENIX Security Symposium"},{"key":"17","first-page":"45","article-title":"the jx operating system","author":"golm","year":"2002","journal-title":"Proceedings of the USENIX Annual Technical Conference"},{"key":"18","first-page":"1","article-title":"the spring nucleus: a microkernel for objects","author":"hamilton","year":"1993","journal-title":"Proceedings of the USENIX Summer Technical Conference"},{"key":"33","first-page":"59","article-title":"defending against denial of service attacks in scout","author":"spatscheck","year":"1999","journal-title":"In Proc of the Fifth Symposium on Operating Systems Design and Implementation"},{"key":"15","article-title":"the vmkit project: jvm and .net runtimes for llvm","author":"geoffray","year":"2008","journal-title":"Proceedings of the LLVM Developer Meeting"},{"key":"34","first-page":"178","article-title":"j-orchestra: automatic java application partitioning","author":"tilevich","year":"2002","journal-title":"Proceedings of European Conference of Object-Oriented Programming"},{"key":"16","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1145\/1411732.1411743","article-title":"a lazy developer approach: building a jvm with third party software","author":"geoffray","year":"2008","journal-title":"Proceedings of the International Symposium on Principles and Practice of Programming In Java"},{"key":"13","first-page":"97","article-title":"evolving mach 3.0 to a migrating thread model","author":"ford","year":"1994","journal-title":"Proceedings of the USENIX Winter Technical Conference"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1462735.1462749"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/121132.121155"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1217935.1217953"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1272996.1273032"},{"key":"20","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1145\/1060289.1060325","article-title":"luna: a flexible java protection system","author":"hawblitzel","year":"2002","journal-title":"In Proc of the Fifth Symposium on Operating Systems Design and Implementation"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/HOTOS.1995.513447"},{"journal-title":"Capability-Based Computer Systems","year":"1984","author":"levy","key":"23"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/286936.286945"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/HOTOS.1997.595177"},{"year":"0","key":"26"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/582419.582444"},{"key":"28","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1007\/978-3-540-87891-9_6","article-title":"classification of component vulnerabilities in java service oriented programming platforms","author":"parrend","year":"2008","journal-title":"Proceedings of the Component-Based Software Engineering Symposium"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1002\/spe.906"},{"journal-title":"Jonas J2EE Server","year":"0","key":"3"},{"journal-title":"Equinox","year":"0","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/286936.286944"},{"journal-title":"Apache Felix","year":"0","key":"1"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2003.1199342"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/77648.77650"},{"key":"6","first-page":"45","article-title":"resource containers: a new facility for resource management in server systems","author":"banga","year":"1999","journal-title":"In Proc of the Fifth Symposium on Operating Systems Design and Implementation"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1145\/505586.505589"},{"key":"5","first-page":"333","article-title":"processes in kaffeos: isolation, resource management, and sharing in java","author":"back","year":"2000","journal-title":"In Proc of the Fifth Symposium on Operating Systems Design and Implementation"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2007.4342834"},{"journal-title":"SPECJVM98","year":"0","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/504282.504292"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1002\/spe.712"}],"event":{"name":"amp; Networks (DSN)","start":{"date-parts":[[2009,6,29]]},"location":"Lisbon","end":{"date-parts":[[2009,7,2]]}},"container-title":["2009 IEEE\/IFIP International Conference on Dependable Systems &amp; Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5243642\/5270274\/05270296.pdf?arnumber=5270296","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T00:17:19Z","timestamp":1497831439000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5270296\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/dsn.2009.5270296","relation":{},"subject":[],"published":{"date-parts":[[2009,6]]}}}