{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T04:44:43Z","timestamp":1725770683427},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,5,21]]},"DOI":"10.1145\/1985793.1985915","type":"proceedings-article","created":{"date-parts":[[2011,5,24]],"date-time":"2011-05-24T09:04:30Z","timestamp":1306227870000},"page":"828-831","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Permission-based programming languages (NIER track)"],"prefix":"10.1145","author":[{"given":"Jonathan","family":"Aldrich","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Ronald","family":"Garcia","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Mark","family":"Hahnenberg","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Manuel","family":"Mohr","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University & Karlsruhe Institute of Technology, Pittsburgh, PA, USA"}]},{"given":"Karl","family":"Naden","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Darpan","family":"Saini","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Sven","family":"Stork","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Joshua","family":"Sunshine","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"\u00c9ric","family":"Tanter","sequence":"additional","affiliation":[{"name":"University of Chile, Santiago, Chile"}]},{"given":"Roger","family":"Wolff","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,5,21]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1145\/1639950.1640073"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1145\/199818.199860"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1145\/1297027.1297050"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1145\/320384.320392"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1145\/582419.582440"},{"key":"e_1_3_2_1_7_1","volume-title":"European Conference on Object-Oriented Programming","author":"Boyland J.","year":"2001","unstructured":"J. Boyland , J. Noble , and W. Retert . Capabilities for sharing: A generalization of uniqueness and read-only . In European Conference on Object-Oriented Programming , 2001 . J. Boyland, J. Noble, and W. Retert. Capabilities for sharing: A generalization of uniqueness and read-only. In European Conference on Object-Oriented Programming, 2001."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1145\/378795.378811"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1145\/581339.581395"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/512529.512563"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1145\/117954.117975"},{"key":"e_1_3_2_1_12_1","volume-title":"Flexible Alias Protection. In European Conference on Object-Oriented Programming","author":"Noble J.","year":"1998","unstructured":"J. Noble , J. Vitek , and J. Potter . Flexible Alias Protection. In European Conference on Object-Oriented Programming , 1998 . J. Noble, J. Vitek, and J. Potter. Flexible Alias Protection. In European Conference on Object-Oriented Programming, 1998."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1145\/606666.606670"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1145\/1639950.1640060"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1145\/1926385.1926436"},{"key":"e_1_3_2_1_16_1","volume-title":"Linear types can change the world! In Working Conference on Programming Concepts and Methods","author":"Wadler P.","year":"1990","unstructured":"P. Wadler . Linear types can change the world! In Working Conference on Programming Concepts and Methods , 1990 . P. Wadler. Linear types can change the world! In Working Conference on Programming Concepts and Methods, 1990."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1145\/363911.363923"}],"event":{"sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"acronym":"ICSE11","name":"ICSE11: International Conference on Software Engineering","location":"Waikiki, Honolulu HI USA"},"container-title":["Proceedings of the 33rd International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1985793.1985915","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,6]],"date-time":"2023-01-06T19:38:15Z","timestamp":1673033895000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1985793.1985915"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,5,21]]},"references-count":16,"alternative-id":["10.1145\/1985793.1985915","10.1145\/1985793"],"URL":"https:\/\/doi.org\/10.1145\/1985793.1985915","relation":{},"subject":[],"published":{"date-parts":[[2011,5,21]]},"assertion":[{"value":"2011-05-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}