{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:46:51Z","timestamp":1772164011616,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,22]],"date-time":"2011-10-22T00:00:00Z","timestamp":1319241600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,22]]},"DOI":"10.1145\/2048066.2048091","type":"proceedings-article","created":{"date-parts":[[2011,10,25]],"date-time":"2011-10-25T08:23:06Z","timestamp":1319530986000},"page":"289-306","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Ribbons"],"prefix":"10.1145","author":[{"given":"Kevin J.","family":"Hoffman","sequence":"first","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Harrison","family":"Metzger","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Patrick","family":"Eugster","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,10,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1178597.1178599"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.442.0399"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/11785477_7"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/224057.224077"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1167473.1167488"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/582419.582440"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/781131.781168"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/195792.195795"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315248"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1168054.1168069"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/319151.319161"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/286936.286947"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/800213.806532"},{"key":"e_1_3_2_1_14_1","first-page":"7","volume-title":"USENIX ATC'03","author":"Czajkowski G.","year":"2003","unstructured":"G. Czajkowski , L. Dayn\u00e8s , and B. Titzer . A Multi-user Virtual Machine . In USENIX ATC'03 , pages 7 -- 7 , 2003 . G. Czajkowski, L. Dayn\u00e8s, and B. Titzer. A Multi-user Virtual Machine. In USENIX ATC'03, pages 7--7, 2003."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.116849"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1947337.1947364"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-024X(20000410)30:4%3C295::AID-SPE301%3E3.0.CO;2-P"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346295"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297027.1297029"},{"key":"e_1_3_2_1_20_1","first-page":"6","volume-title":"XFI: Software Guards for System Address Spaces. In OSDI'06","author":"Erlingsson U.","year":"2006","unstructured":"U. Erlingsson , M. Abadi , M. Vrable , M. Budiu , and G. Necula . XFI: Software Guards for System Address Spaces. In OSDI'06 , pages 6 -- 6 , 2006 . U. Erlingsson, M. Abadi, M. Vrable, M. Budiu, and G. Necula. XFI: Software Guards for System Address Spaces. In OSDI'06, pages 6--6, 2006."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/996841.996849"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/268946.268961"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512563"},{"key":"e_1_3_2_1_24_1","volume-title":"Java Developers Forum","author":"Heiss J. J.","year":"2005","unstructured":"J. J. Heiss . The Multi-Tasking Virtual Machine: Building a Highly Scalable JVM . Java Developers Forum , March 2005 . J. J. Heiss. The Multi-Tasking Virtual Machine: Building a Highly Scalable JVM. Java Developers Forum, March 2005."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"K. Hoffman. http:\/\/kevinjhoffman.com\/ribbons\/ 2011.  K. Hoffman. http:\/\/kevinjhoffman.com\/ribbons\/ 2011.","DOI":"10.1145\/2048066.2048091"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/503502.503505"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2005.29"},{"key":"e_1_3_2_1_28_1","volume-title":"Security In KeyKOS. In SP'86","author":"Rajunas S.","year":"1986","unstructured":"S. Rajunas , N. Hardy , A. Bomberger , W. Frantz , and C. Landau . Security In KeyKOS. In SP'86 , 0:78, 1986 . S. Rajunas, N. Hardy, A. Bomberger, W. Frantz, and C. Landau. Security In KeyKOS. In SP'86, 0:78, 1986."},{"key":"e_1_3_2_1_29_1","first-page":"21","volume-title":"Enhancing Server Availability and Security Through Failure-Oblivious Computing. In OSDI'04","author":"Rinard M.","year":"2004","unstructured":"M. Rinard , C. Cadar , D. Dumitran , D. Roy , T. Leu , and W. B. Jr . Enhancing Server Availability and Security Through Failure-Oblivious Computing. In OSDI'04 , pages 21 -- 21 , 2004 . M. Rinard, C. Cadar, D. Dumitran, D. Roy, T. Leu, and W. B. Jr. Enhancing Server Availability and Security Through Failure-Oblivious Computing. In OSDI'04, pages 21--21, 2004."},{"key":"e_1_3_2_1_30_1","first-page":"215","volume-title":"The MONADS Architecture: A Layered View. In POS'90","author":"Rosenberg J.","year":"1990","unstructured":"J. Rosenberg . The MONADS Architecture: A Layered View. In POS'90 , pages 215 -- 225 , 1990 . J. Rosenberg. The MONADS Architecture: A Layered View. In POS'90, pages 215--225, 1990."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1147\/rd.502.0261"},{"key":"e_1_3_2_1_32_1","first-page":"222","volume-title":"HPCA'06","author":"Shi W.","year":"2006","unstructured":"W. Shi , J. Fryman , G. Gu , H.-H. Lee , Y. Zhang , and J. Yang . InfoShield: a Security Architecture for Protecting Information Usage in Memory . In HPCA'06 , pages 222 -- 231 , 2006 . W. Shi, J. Fryman, G. Gu, H.-H. Lee, Y. Zhang, and J. Yang. InfoShield: a Security Architecture for Protecting Information Usage in Memory. In HPCA'06, pages 222--231, 2006."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1047915.1047919"},{"key":"e_1_3_2_1_34_1","first-page":"64","volume-title":"Efficient Kernel Support of Fine-Grained Protection Domains for Mobile Code. In ICDCS'99","author":"Takahashi M.","year":"1999","unstructured":"M. Takahashi , K. Kono , and T. Masuda . Efficient Kernel Support of Fine-Grained Protection Domains for Mobile Code. In ICDCS'99 , page 64 , 1999 . M. Takahashi, K. Kono, and T. Masuda. Efficient Kernel Support of Fine-Grained Protection Domains for Mobile Code. In ICDCS'99, page 64, 1999."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/291891.291894"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2007.346205"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/173668.168635"},{"key":"e_1_3_2_1_38_1","first-page":"320","volume-title":"Legba: Fast Hardware Support for Fine-Grained Protection. In ACSAC'03","author":"Wiggins A.","year":"2003","unstructured":"A. Wiggins , S. Winwood , H. Tuch , and G. Heiser . Legba: Fast Hardware Support for Fine-Grained Protection. In ACSAC'03 , pages 320 -- 336 , 2003 . A. Wiggins, S. Winwood, H. Tuch, and G. Heiser. Legba: Fast Hardware Support for Fine-Grained Protection. In ACSAC'03, pages 320--336, 2003."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095814"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2006.33"}],"event":{"name":"SPLASH '11: Conference on Systems, Programming, and Applications: Software for Humanity","location":"Portland Oregon USA","acronym":"SPLASH '11","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the 2011 ACM international conference on Object oriented programming systems languages and applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2048066.2048091","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2048066.2048091","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:31Z","timestamp":1750225711000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2048066.2048091"}},"subtitle":["a partially shared memory programming model"],"short-title":[],"issued":{"date-parts":[[2011,10,22]]},"references-count":40,"alternative-id":["10.1145\/2048066.2048091","10.1145\/2048066"],"URL":"https:\/\/doi.org\/10.1145\/2048066.2048091","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2076021.2048091","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2011,10,22]]},"assertion":[{"value":"2011-10-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}