{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:28:29Z","timestamp":1750307309564,"version":"3.41.0"},"reference-count":5,"publisher":"Association for Computing Machinery (ACM)","issue":"11","license":[{"start":{"date-parts":[[2011,11,1]],"date-time":"2011-11-01T00:00:00Z","timestamp":1320105600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2011,11]]},"abstract":"<jats:p>Difficult technical problems and tough business challenges.<\/jats:p>","DOI":"10.1145\/2018396.2018411","type":"journal-article","created":{"date-parts":[[2011,10,25]],"date-time":"2011-10-25T12:23:05Z","timestamp":1319545385000},"page":"48-52","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Java security architecture revisited"],"prefix":"10.1145","volume":"54","author":[{"given":"Li","family":"Gong","sequence":"first","affiliation":[{"name":"Mozilla Online Ltd."}]}],"member":"320","published-online":{"date-parts":[[2011,11]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/40.591650"},{"key":"e_1_2_1_2_1","volume-title":"API Design and Implementation","author":"Gong L.","year":"2003","unstructured":"Gong , L. , Ellison , G. and Dageforde , M . Inside Java 2 Platform Security: Architecture , API Design and Implementation , second ed. Addison-Wesley , Reading, Pa , 2003 . Gong, L., Ellison, G. and Dageforde, M. Inside Java 2 Platform Security: Architecture, API Design and Implementation, second ed. Addison-Wesley, Reading, Pa, 2003."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/361011.361067"},{"key":"e_1_2_1_4_1","volume-title":"Proceedings of the International Conference on Software Testing and Review (Nov.","author":"Sirer E.","year":"1999","unstructured":"Sirer , E. and Bershad , B . Testing Java Virtual Machines . In Proceedings of the International Conference on Software Testing and Review (Nov. 1999 ). Sirer, E. and Bershad, B. Testing Java Virtual Machines. In Proceedings of the International Conference on Software Testing and Review (Nov. 1999)."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/353323.353382"}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2018396.2018411","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2018396.2018411","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:00:04Z","timestamp":1750244404000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2018396.2018411"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11]]},"references-count":5,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2011,11]]}},"alternative-id":["10.1145\/2018396.2018411"],"URL":"https:\/\/doi.org\/10.1145\/2018396.2018411","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"type":"print","value":"0001-0782"},{"type":"electronic","value":"1557-7317"}],"subject":[],"published":{"date-parts":[[2011,11]]},"assertion":[{"value":"2011-11-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}