{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:52:47Z","timestamp":1729641167261,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE Comput. Soc. Press","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icdcs.1997.598069","type":"proceedings-article","created":{"date-parts":[[2002,11,22]],"date-time":"2002-11-22T15:23:27Z","timestamp":1037978607000},"page":"355-362","source":"Crossref","is-referenced-by-count":1,"title":["Encapsulating mobile objects"],"prefix":"10.1109","author":[{"given":"H.","family":"Hartig","sequence":"first","affiliation":[]},{"given":"L.","family":"Reuther","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.1992.235000"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2660"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/224056.224075"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-77422-5_25"},{"journal-title":"Prinzessin auf der Erbse - Linux-Portierung auf den Mikrokern L4 iX Magazine","year":"97","author":"hohmuth","key":"ref15"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.1990.89290"},{"key":"ref3","article-title":"The BirliX Security Architecture","volume":"2","author":"h\ufffdrtig","year":"1993","journal-title":"Journal of Computer Security"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/800213.806530"},{"key":"ref5","article-title":"Using sparse capabilities in a Distributed Operating System","author":"tanenbaum","year":"1986","journal-title":"Proceedings of the 6th International Conference on Distributed Computing Systems"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.21236\/ADA023588","author":"bell","year":"1976","journal-title":"Leonard LaPadula Secure Operating Systems Unified exposition and Multics interpretation"},{"key":"ref7","article-title":"The Cambridge CAP computer and its Operating System","author":"wilkes","year":"1979","journal-title":"The Computer Science Library"},{"key":"ref2","article-title":"The Amoeba Security Architecture","author":"mullender","year":"1990","journal-title":"Joint INRIA CWI Workshop on Operating Systems"},{"key":"ref1","article-title":"Mobile Objects and Agents","author":"milojicic","year":"1996","journal-title":"Advanced Topics Workshop at the Second USENIX Conference on Object Oriented Technologies and Systems"},{"key":"ref9","article-title":"A Secure Environment for Untrusted Helper Applications (Confining the Wily Hacker)","author":"goldberg","year":"1996","journal-title":"Proceedings of the sixth Usenix UNIX Security Symposium"}],"event":{"name":"17th International Conference on Distributed Computing Systems","acronym":"ICDCS-97","location":"Baltimore, MD, USA"},"container-title":["Proceedings of 17th International Conference on Distributed Computing Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx3\/4669\/13079\/00598069.pdf?arnumber=598069","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,18]],"date-time":"2018-01-18T14:49:13Z","timestamp":1516286953000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/598069\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/icdcs.1997.598069","relation":{},"subject":[]}}