{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T18:31:51Z","timestamp":1725733911298},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/isorc.2013.6913208","type":"proceedings-article","created":{"date-parts":[[2014,10,8]],"date-time":"2014-10-08T20:48:11Z","timestamp":1412801291000},"page":"1-7","source":"Crossref","is-referenced-by-count":3,"title":["Security Enhanced Java: Mandatory Access Control for the Java Virtual Machine"],"prefix":"10.1109","author":[{"given":"Benjamin","family":"Venelle","sequence":"first","affiliation":[]},{"given":"Jeremy","family":"Briffaut","sequence":"additional","affiliation":[]},{"given":"Laurent","family":"Clevy","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Toinard","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Middleware mac for seandroid","author":"smalley","year":"2012","journal-title":"Linux Security Submit"},{"journal-title":"Trishul A Policy Enforcement Architecture for Java Virtual Machines","year":"2008","author":"nair","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1854099.1854107"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.21"},{"key":"16","article-title":"Practical, dynamic information-flow for virtual machines","author":"haldar","year":"2005","journal-title":"Department of Information and Computer Science"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/596980.596983"},{"key":"14","first-page":"152","article-title":"Flow caml in a nutshell","author":"simonet","year":"2003","journal-title":"Proceedings of the first APPSEM-II workshop"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.2168\/LMCS-7(3:17)2011"},{"journal-title":"Jif Java Information Flow","year":"0","author":"myers","key":"12"},{"journal-title":"The Java Virtual Machine Specification","year":"2011","author":"tim lindholm","key":"3"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/CTS.2010.5478471"},{"journal-title":"The Java Language Specification","year":"2011","author":"gosling","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/S0065-2458(08)60506-9"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2010.01.025"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1090\/S0002-9947-1953-0053041-6"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025055424017"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.10"},{"key":"4","first-page":"107","article-title":"Access control based on execution history","author":"abadi","year":"2003","journal-title":"Proceedings of the 10th Annual Network and Distributed System Security Symposium"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.29"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1024393.1024404"}],"event":{"name":"2013 IEEE 16th International Symposium on Object\/Component\/Service-Oriented Real-Time Distributed Computing (ISORC)","start":{"date-parts":[[2013,6,19]]},"location":"Paderborn, Germany","end":{"date-parts":[[2013,6,21]]}},"container-title":["16th IEEE International Symposium on Object\/component\/service-oriented Real-time distributed Computing (ISORC 2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6906723\/6913188\/06913208.pdf?arnumber=6913208","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T22:24:46Z","timestamp":1490307886000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6913208\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/isorc.2013.6913208","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}