{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T12:31:43Z","timestamp":1725625903037},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,3]]},"DOI":"10.1109\/vr.2008.4480750","type":"proceedings-article","created":{"date-parts":[[2008,4,9]],"date-time":"2008-04-09T20:05:43Z","timestamp":1207771543000},"page":"51-58","source":"Crossref","is-referenced-by-count":3,"title":["Object-Capability Security in Virtual Environments"],"prefix":"10.1109","author":[{"given":"Martin","family":"Scheffler","sequence":"first","affiliation":[]},{"given":"Jan P.","family":"Springer","sequence":"additional","affiliation":[]},{"given":"Bernd","family":"Froehlich","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/261135.261142"},{"key":"15","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1007\/3-540-36159-6_24","article-title":"user interaction design for secure systems","author":"yee","year":"2002","journal-title":"IClCS '02 Proceedings of the 4th International Conference on Information and Communications Security"},{"key":"16","first-page":"41","article-title":"interactive social displays","author":"pfeiffer","year":"2007","journal-title":"IPT\/EGVE 2007 10th Immersive Projection Technology Workshop & 13th EG Symposium on Virtual Environments"},{"key":"13","first-page":"133","article-title":"markets and computation: agoric open systems","author":"miller","year":"1988","journal-title":"The Ecology of Computation"},{"key":"14","article-title":"delegating responsibility in digital systems: horton's who done it?","author":"miller","year":"2007","journal-title":"Proceedings HotSec '07"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/259964.260134"},{"year":"0","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-011-2094-4_8"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/54289.871709"},{"year":"1973","author":"jones","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/361932.361937"},{"key":"7","article-title":"capability-based financial instruments","author":"miller","year":"2000","journal-title":"Proceedings of Financial Cryptography"},{"journal-title":"Robust Composition Towards a Unified Approach to Access Control and Concurrency Control","year":"2006","author":"miller","key":"6"},{"year":"0","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/VR.1999.756918"},{"year":"0","key":"9"},{"journal-title":"Design Patterns Elements of Reusable Object-Oriented Software","year":"1995","author":"gamma","key":"8"}],"event":{"name":"IEEE Virtual Reality 2008","start":{"date-parts":[[2008,3,8]]},"location":"Reno, NV, USA","end":{"date-parts":[[2008,3,12]]}},"container-title":["2008 IEEE Virtual Reality Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4472735\/4480728\/04480750.pdf?arnumber=4480750","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,4]],"date-time":"2021-06-04T15:05:03Z","timestamp":1622819103000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/4480750\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,3]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/vr.2008.4480750","relation":{},"subject":[],"published":{"date-parts":[[2008,3]]}}}