iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1007/11908739_13
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:45:04Z","timestamp":1725471904928},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540476993"},{"type":"electronic","value":"9783540477006"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11908739_13","type":"book-chapter","created":{"date-parts":[[2006,10,11]],"date-time":"2006-10-11T15:19:02Z","timestamp":1160579942000},"page":"179-195","source":"Crossref","is-referenced-by-count":5,"title":["Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing"],"prefix":"10.1007","author":[{"given":"Xinwen","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Francesco","family":"Parisi-Presicce","sequence":"additional","affiliation":[]},{"given":"Ravi","family":"Sandhu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"AMD platform for trustworthy computing. Microsoft WinHEC (2003), \n \n http:\/\/www.microsoft.com\/whdc\/winhec\/pres03.mspx"},{"key":"13_CR2","unstructured":"LaGrande Technology Preliminary Architecture Specification, \n \n http:\/\/www.intel.com\/technology\/security\/downloads\/PRELIM-LT-SPEC_D52212.htm"},{"key":"13_CR3","unstructured":"OASIS XACML TC. Core Specification: eXtensible Access Control Markup Language (XACML) (2005)"},{"key":"13_CR4","unstructured":"Sun\u2019s XACML implementation, \n \n http:\/\/sunxacml.sourceforge.net\/"},{"key":"13_CR5","unstructured":"TCG Specification Architecture Overview, \n \n https:\/\/www.trustedcomputinggroup.org"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Algesheimer, J., Cashin, C., Camenisch, J., Karjoth, G.: Cryptographic Security for Mobile Code. In: IEEE Symposium On Research in Security and Privacy (2001)","DOI":"10.1109\/SECPRI.2001.924283"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Balfanz, D., Gong, L.: Experience with Secure Multi-Processing in Java. In: International Conference on Distributed Computing Systems (1998)","DOI":"10.1109\/ICDCS.1998.679754"},{"key":"13_CR8","unstructured":"Cubaleska, B., Scheider, M.: Applying Trust Policies for Protecting Mobile Agents Aganist DoS. In: 3rd Workship on Policies for Distributed Systems and Networks (2002)"},{"volume-title":"Inside Java 2 Platform Security: Architecture, API Design, and Implementation","year":"2003","author":"L. Gong","key":"13_CR9","unstructured":"Gong, L., Gary, E., Mary, D.: Inside Java 2 Platform Security: Architecture, API Design, and Implementation. Addison-Wesley, Reading (2003)"},{"key":"13_CR10","unstructured":"Gong, L., Mueller, M., Prafullchandra, H., Schemers, R.: Going Beyond the Sandbox: An Overview of the New Security Arthitecture in the Java Development Kit 1.2. In: USENIX Symposium on Internet Technologies and Systems (1997)"},{"key":"13_CR11","unstructured":"Haldar, V., Chandra, D., Franz, M.: Semantic remote attestation - a virtual machine directed approach to trusted computing. In: Proc. of the Third virtual Machine Research and Technology Symposium. USENIX (2004)"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Hauswirth, M., Kerer, C., Kurmanowytsch, R.: A Secure Execution Framework for Java. In: Proc. of ACM Computer and Communication Security (2000)","DOI":"10.1145\/352600.352608"},{"key":"13_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/3-540-68671-1_6","volume-title":"Mobile Agents and Security","author":"F. Hohl","year":"1998","unstructured":"Hohl, F.: Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol.\u00a01419, p. 92. Springer, Heidelberg (1998)"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Jajodia, S., Samarati, P., Subrahmanian, V., Bertino, E.: A Unified Framework for Enforcing Multiple Access Control Policies. In: ACM SIGMOD (1997)","DOI":"10.1145\/253260.253364"},{"key":"13_CR15","unstructured":"Lai, C., Gong, L., Koved, L., Nadalin, A., Schemers, R.: User Authentication and Authorization in the Java Platform. In: Annual Computer Security Applications Conference (1999)"},{"volume-title":"Net Framework Security","year":"2002","author":"B. LaMacchia","key":"13_CR16","unstructured":"LaMacchia, B., Lange, S., Lyons, M., Martin, R., Price, K.: Net Framework Security. Addison-Wesley, Reading (2002)"},{"key":"13_CR17","unstructured":"Lee, P., Necula, G.: Research on Proof-carry Code for Mobile Code Security. In: DARPA workshop on Foundation for Secure Mobile Code (1997)"},{"key":"13_CR18","unstructured":"Liang, Z., Venkatakrishan, V.N., Sekar, R.: Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs. In: Annual Computer Security Applications Conference (2003)"},{"volume-title":"Securing Java: Getting Down to Business with Mobile Code","year":"1999","author":"G. McGraw","key":"13_CR19","unstructured":"McGraw, G., Felten, E.: Securing Java: Getting Down to Business with Mobile Code. Wiley, Chichester (1999), \n \n http:\/\/www.securingjava.com"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"McGraw, G., Morrisett, G.: Attacking Malicious Code: A Report to the Infosec Research Council. IEEE Software\u00a017(5) (September\/October 2000)","DOI":"10.1109\/52.877857"},{"volume-title":"Java Security","year":"2001","author":"S. Oaks","key":"13_CR21","unstructured":"Oaks, S.: Java Security. O\u2019Reilly, Sebastopol (2001)"},{"key":"13_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/3-540-68671-1_4","volume-title":"Mobile Agents and Security","author":"T. Sander","year":"1998","unstructured":"Sander, T., Tschudin, C.F.: Protecting Mobile Agent against Malicious Hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol.\u00a01419, p. 44. Springer, Heidelberg (1998)"},{"key":"13_CR23","unstructured":"TCPA Design Philosphies and Concepts, \n \n http:\/\/www.trustedcomputing.org\/home"},{"key":"13_CR24","unstructured":"Trusted Computing Group Home, \n \n https:\/\/www.trustedcomputinggroup.org\/home"},{"key":"13_CR25","doi-asserted-by":"crossref","unstructured":"Venkatakrishnan, V., Peri, R., Sekar, R.: Empowering Mobile Code Using Expressive Security Policies. In: New Security Paradigms Workshop (2002)","DOI":"10.1145\/844102.844113"},{"key":"13_CR26","unstructured":"Vigna, G.: Protecting Mobile Agents Through Tracing. In: Proc. of the Workshop on Mobile Object systems (1997)"},{"key":"13_CR27","unstructured":"Wallach, D.S., Felten, E.: Understand Java Stack Inspection. In: IEEE Symposium On Research in Security and Privacy (1998)"},{"key":"13_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48749-2_12","volume-title":"Secure Internet Programming","author":"B. Yee","year":"1999","unstructured":"Yee, B.: A Sanctuary for Mobile Agents. In: Vitek, J. (ed.) Secure Internet Programming. LNCS, vol.\u00a01603. Springer, Heidelberg (1999)"},{"key":"13_CR29","doi-asserted-by":"crossref","unstructured":"Zachry, J.: Protecting Mobile Code in the Wild. IEEE Internet Computing (March\/April 2003)","DOI":"10.1109\/MIC.2003.1189192"}],"container-title":["Lecture Notes in Computer Science","Advances in Information and Computer Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11908739_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:38:59Z","timestamp":1619509139000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11908739_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540476993","9783540477006"],"references-count":29,"URL":"http:\/\/dx.doi.org\/10.1007\/11908739_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}