{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:41:40Z","timestamp":1750308100853,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,11,7]],"date-time":"2005-11-07T00:00:00Z","timestamp":1131321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,11,7]]},"DOI":"10.1145\/1101908.1101933","type":"proceedings-article","created":{"date-parts":[[2006,2,6]],"date-time":"2006-02-06T15:52:40Z","timestamp":1139241160000},"page":"154-163","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Secure sharing between untrusted users in a transparent source\/binary deployment model"],"prefix":"10.1145","author":[{"given":"Eelco","family":"Dolstra","sequence":"first","affiliation":[{"name":"Utrecht University, Utrecht, The Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2005,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"79","volume-title":"18th Large Installation System Administration Conference (LISA '04)","author":"Dolstra E.","year":"2004","unstructured":"E. Dolstra , M. de Jonge , and E. Visser . Nix: A safe and policy-free system for software deployment. In L. Damon, editor , 18th Large Installation System Administration Conference (LISA '04) , pages 79 -- 92 , Atlanta, Georgia, USA , November 2004 . USENIX. E. Dolstra, M. de Jonge, and E. Visser. Nix: A safe and policy-free system for software deployment. In L. Damon, editor, 18th Large Installation System Administration Conference (LISA '04), pages 79--92, Atlanta, Georgia, USA, November 2004. USENIX."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/998675.999463"},{"key":"e_1_3_2_1_3_1","volume-title":"Red Hat RPM Guide","author":"Foster-Johnson E.","year":"2003","unstructured":"E. Foster-Johnson . Red Hat RPM Guide . John Wiley and Sons , 2003 . E. Foster-Johnson. Red Hat RPM Guide. John Wiley and Sons, 2003."},{"key":"e_1_3_2_1_4_1","unstructured":"FreeBSD Project. FreeBSD Ports Collection. http:\/\/www.freebsd.org\/ports\/.  FreeBSD Project. FreeBSD Ports Collection. http:\/\/www.freebsd.org\/ports\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Gentoo Foundation. Gentoo Linux. http:\/\/www.gentoo.org\/.  Gentoo Foundation. Gentoo Linux. http:\/\/www.gentoo.org\/."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24848-4_12"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/349299.349341"},{"key":"e_1_3_2_1_8_1","volume-title":"http:\/\/www.venge.net\/monotone\/","author":"Hoare G.","year":"2005","unstructured":"G. Hoare . Monotone. http:\/\/www.venge.net\/monotone\/ , 2005 . G. Hoare. Monotone. http:\/\/www.venge.net\/monotone\/, 2005."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/646591.697650"},{"key":"e_1_3_2_1_10_1","volume-title":"Applied Cryptography","author":"Schneier B.","year":"1996","unstructured":"B. Schneier . Applied Cryptography . John Wiley and Sons , second edition, 1996 . B. Schneier. Applied Cryptography. John Wiley and Sons, second edition, 1996."},{"key":"e_1_3_2_1_11_1","volume-title":"Advanced Programming in the UNIX Environment","author":"Stevens W. R.","year":"1993","unstructured":"W. R. Stevens . Advanced Programming in the UNIX Environment . Addison-Wesley , 1993 . W. R. Stevens. Advanced Programming in the UNIX Environment. Addison-Wesley, 1993."},{"key":"e_1_3_2_1_12_1","volume-title":"Component Software --- Beyond Object-Oriented Programming","author":"Szyperski C.","year":"2002","unstructured":"C. Szyperski . Component Software --- Beyond Object-Oriented Programming . Addison-Wesley \/ ACM Press , second edition, 2002 . C. Szyperski. Component Software --- Beyond Object-Oriented Programming. Addison-Wesley \/ ACM Press, second edition, 2002."},{"key":"e_1_3_2_1_13_1","volume-title":"Version 1.2","author":"TIS Committee","year":"1995","unstructured":"TIS Committee . Tool Interface Specification (TIS) Executable and Linking Format (ELF) Specification , Version 1.2 , May 1995 . TIS Committee. Tool Interface Specification (TIS) Executable and Linking Format (ELF) Specification, Version 1.2, May 1995."},{"key":"e_1_3_2_1_14_1","first-page":"219","volume-title":"16th Systems Administration Conference (LISA '02)","author":"Venkatakrishnan V. N.","year":"2002","unstructured":"V. N. Venkatakrishnan , R. Sekar , T. Kamat , S. Tsipa , and Z. Liang . An approach for secure software installation . In 16th Systems Administration Conference (LISA '02) , pages 219 -- 226 . USENIX Association , Nov. 2002 . V. N. Venkatakrishnan, R. Sekar, T. Kamat, S. Tsipa, and Z. Liang. An approach for secure software installation. In 16th Systems Administration Conference (LISA '02), pages 219--226. USENIX Association, Nov. 2002."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_2"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_2"}],"event":{"name":"ASE05: International Conference on Automated Software Engineering 2005","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","ACM Association for Computing Machinery","SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Long Beach CA USA","acronym":"ASE05"},"container-title":["Proceedings of the 20th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1101908.1101933","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1101908.1101933","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:08:02Z","timestamp":1750262882000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1101908.1101933"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,11,7]]},"references-count":16,"alternative-id":["10.1145\/1101908.1101933","10.1145\/1101908"],"URL":"https:\/\/doi.org\/10.1145\/1101908.1101933","relation":{},"subject":[],"published":{"date-parts":[[2005,11,7]]},"assertion":[{"value":"2005-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}