{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T16:51:08Z","timestamp":1694623868371},"reference-count":32,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2000,1,1]],"date-time":"2000-01-01T00:00:00Z","timestamp":946684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2000]]},"DOI":"10.1109\/32.888632","type":"journal-article","created":{"date-parts":[[2002,8,24]],"date-time":"2002-08-24T18:17:23Z","timestamp":1030213043000},"page":"1197-1209","source":"Crossref","is-referenced-by-count":16,"title":["Secure execution of Java applets using a remote playground"],"prefix":"10.1109","volume":"26","author":[{"given":"D.","family":"Malkhi","sequence":"first","affiliation":[]},{"given":"M.K.","family":"Reiter","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"bibE119726","doi-asserted-by":"publisher","DOI":"10.1145\/238721.238781"},{"key":"bibE11978","article-title":"jres: a resource accounting interface for java","author":"czajkowski","year":"1998","journal-title":"Proc ACM OOPSLA Conf"},{"key":"bibE11979","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502681"},{"key":"bibE119727","year":"1996","journal-title":"Java Object Serialization Specification"},{"key":"bibE119728","year":"1997","journal-title":"Java remote method invocation specification"},{"key":"bibE119729","article-title":"teleporting&mdash;mobile x sessions","author":"richardson","year":"1995","journal-title":"Proc Ninth Ann X Technical Conf"},{"key":"bibE119722","article-title":"trestle reference manual","author":"manasse","year":"1991"},{"key":"bibE119723","doi-asserted-by":"publisher","DOI":"10.1109\/NDSS.1997.579215"},{"key":"bibE119724","doi-asserted-by":"publisher","DOI":"10.1145\/238721.238771"},{"key":"bibE119725","doi-asserted-by":"publisher","DOI":"10.1145\/263699.263712"},{"key":"bibE119720","author":"mcgraw","year":"1997","journal-title":"Java Security Hostile Applets Holes and Antidotes"},{"key":"bibE119721","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1998.674822"},{"key":"bibE11971","doi-asserted-by":"publisher","DOI":"10.1109\/TRICOM.1991.152885"},{"key":"bibE11973","article-title":"java operating systems: design and implementation","author":"back","year":"1998"},{"key":"bibE11972","first-page":"187","article-title":"security of web browser scripting languages: vulnerabilities, attacks, and remedies","author":"anupam","year":"1998","journal-title":"Proc Seventh USENIX Security Symp"},{"key":"bibE11975","doi-asserted-by":"crossref","DOI":"10.1109\/ICDCS.1998.679754","article-title":"experience with secure multiprocessing in java","author":"balfanz","year":"1998","journal-title":"Proc 18th Int l Conf Distributed Computing Systems"},{"key":"bibE11974","article-title":"a java filter","author":"balfanz","year":"1997"},{"key":"bibE11977","author":"chapman","year":"1995","journal-title":"Building Internet Firewalls"},{"key":"bibE11976","author":"cheswick","year":"1994","journal-title":"Firewalls and Internet Security Repelling the Wily Hacker"},{"key":"bibE119717","doi-asserted-by":"publisher","DOI":"10.1145\/35037.35059"},{"key":"bibE119718","article-title":"pushing the limits of java security","author":"ladue","year":"1996","journal-title":"Tricks of the Java Programming Gurus"},{"key":"bibE119715","article-title":"implementing multiple protection domains in java","author":"hawblitzel","year":"1998","journal-title":"Proc USENIX Ann Technical Conf"},{"key":"bibE119716","article-title":"secure mobile code management: enabling java for the enterprise","author":"herbert","year":"1997"},{"key":"bibE119713","article-title":"going beyond the sandbox: an overview of the new security architecture in the java&trade; development kit 1.2","author":"gong","year":"1997","journal-title":"Proc Usenix Symp Internet Technologies and Systems"},{"key":"bibE119714","doi-asserted-by":"publisher","DOI":"10.1109\/2.755005"},{"key":"bibE119711","author":"flanagan","year":"1997","journal-title":"Java in a Nutshell"},{"key":"bibE119712","doi-asserted-by":"publisher","DOI":"10.1109\/40.591650"},{"key":"bibE119710","article-title":"web spoofing: an internet con game","author":"felten","year":"1997","journal-title":"Proc 20th Nat l Information Systems Security Conf"},{"key":"bibE119731","doi-asserted-by":"publisher","DOI":"10.1145\/268998.266668"},{"key":"bibE119732","article-title":"global teleporting with java: towards ubiquitous personalised computing","author":"wood","year":"0"},{"key":"bibE119730","first-page":"26","article-title":"ibm explains how to use the remote abstract windowing toolkit (rawt)","author":"rosberg","year":"1999","journal-title":"AS\/400 Network Expert Newsletter"},{"key":"bibE119719","author":"lindholm","year":"1997","journal-title":"The Java Virtual Machine Specification"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx5\/32\/19222\/00888632.pdf?arnumber=888632","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T20:05:54Z","timestamp":1638216354000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/ieeexplore.ieee.org\/document\/888632\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"references-count":32,"journal-issue":{"issue":"12"},"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/32.888632","relation":{},"ISSN":["0098-5589"],"issn-type":[{"value":"0098-5589","type":"print"}],"subject":[],"published":{"date-parts":[[2000]]}}}