{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T20:35:28Z","timestamp":1730320528283,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[1999,10]]},"DOI":"10.1145\/320384.320392","type":"proceedings-article","created":{"date-parts":[[2003,11,13]],"date-time":"2003-11-13T19:46:36Z","timestamp":1068752796000},"page":"82-96","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":47,"title":["Confined types"],"prefix":"10.1145","author":[{"given":"Jan","family":"Vitek","sequence":"first","affiliation":[{"name":"Purdue University, Dept. of Computer Sciences"}]},{"given":"Boris","family":"Bokowski","sequence":"additional","affiliation":[{"name":"Freie Universit\u00e4t Berlin, GMD-FIRST Berlin, Germany"}]}],"member":"320","published-online":{"date-parts":[[1999,10]]},"reference":[{"key":"e_1_3_2_1_1_2","doi-asserted-by":"crossref","unstructured":"P. S.\n Almeida\n .\n Balloon types: Controlling sharing of state in data types\n . In M. Aksit and S. Matsuoka editors ECO OP '97--Object-Oriented Programming 11th European Conference volume \n 1241\n of \n Lecture Notes in Computer Science pages \n 32\n -\n 59 Jyv~kyl~i Finland 9-13 June \n 1997\n . \n Springer\n .]] P. S. Almeida. Balloon types: Controlling sharing of state in data types. In M. Aksit and S. Matsuoka editors ECO OP '97--Object-Oriented Programming 11th European Conference volume 1241 of Lecture Notes in Computer Science pages 32-59 Jyv~kyl~i Finland 9-13 June 1997. Springer.]]","DOI":"10.1007\/BFb0053373"},{"key":"e_1_3_2_1_2_2","doi-asserted-by":"publisher","DOI":"10.5555\/318773.319253"},{"key":"e_1_3_2_1_3_2","doi-asserted-by":"publisher","DOI":"10.5555\/646778.704026"},{"key":"e_1_3_2_1_4_2","unstructured":"J. Boyland. Deferring destruction when reading unique variables. Technical report University of Wisconsin- Milwaukee~ Mar. 1999.]] J. Boyland. Deferring destruction when reading unique variables. Technical report University of Wisconsin- Milwaukee~ Mar. 1999.]]"},{"key":"e_1_3_2_1_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/286936.286957"},{"key":"e_1_3_2_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/WWOS.1993.348157"},{"key":"e_1_3_2_1_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/286942.286947"},{"key":"e_1_3_2_1_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/360051.360056"},{"key":"e_1_3_2_1_9_2","volume-title":"Design Patterns - Elements of Reusable Object-Oriented Software","author":"Gamma E~","year":"1995","unstructured":"E~ Gamma , R. Helm , R. Johnson , and J. Vlissides . Design Patterns - Elements of Reusable Object-Oriented Software . Addison-Wesley , 1995 .]] E~ Gamma, R. Helm, R. Johnson, and J. Vlissides. Design Patterns - Elements of Reusable Object-Oriented Software. Addison-Wesley, 1995.]]"},{"key":"e_1_3_2_1_10_2","doi-asserted-by":"publisher","DOI":"10.5555\/647228.719239"},{"key":"e_1_3_2_1_11_2","volume-title":"JavaSoft","author":"Gong L.","year":"1997","unstructured":"L. Gong . Java security architecture (JDK 1.2). Technical report , JavaSoft , July 1997 . Revision 0.5.]] L. Gong. Java security architecture (JDK 1.2). Technical report, JavaSoft, July 1997. Revision 0.5.]]"},{"key":"e_1_3_2_1_12_2","series-title":"LNCS","first-page":"1","volume-title":"Mobile Agents and Security","author":"Gong L.","year":"1998","unstructured":"L. Gong . Guarding objects . In G. Vigna, editor, Mobile Agents and Security , volume 576 of LNCS , pages 1 - 23 , Berlin, Germany, Aug . 1998 . Springer .]] L. Gong. Guarding objects. In G. Vigna, editor, Mobile Agents and Security, volume 576 of LNCS, pages 1-23, Berlin, Germany, Aug. 1998. Springer.]]"},{"key":"e_1_3_2_1_13_2","series-title":"The Java Series","volume-title":"The Java Language Specification","author":"Gosling J.","year":"1996","unstructured":"J. Gosling , B. Joy , and G. L. Steele . The Java Language Specification . The Java Series . Addison-Wesley , Reading, MA, USA , 1996 .]] J. Gosling, B. Joy, and G. L. Steele. The Java Language Specification. The Java Series. Addison-Wesley, Reading, MA, USA, 1996.]]"},{"key":"e_1_3_2_1_14_2","doi-asserted-by":"publisher","DOI":"10.5555\/822075.822411"},{"key":"e_1_3_2_1_15_2","doi-asserted-by":"publisher","DOI":"10.5555\/846217.847163"},{"key":"e_1_3_2_1_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/268946.268976"},{"key":"e_1_3_2_1_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/118014.117975"},{"key":"e_1_3_2_1_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/130943.130947"},{"key":"e_1_3_2_1_20_2","volume-title":"Maung. Encapsulation and Aggregation. In Proceedings of TOOLS PACIFIC 95 (TOOLS 18)","author":"Kent S.","year":"1995","unstructured":"S. Kent and i. Maung. Encapsulation and Aggregation. In Proceedings of TOOLS PACIFIC 95 (TOOLS 18) . Prentice Hall , 1995 .]] S. Kent and i. Maung. Encapsulation and Aggregation. In Proceedings of TOOLS PACIFIC 95 (TOOLS 18). Prentice Hall, 1995.]]"},{"key":"e_1_3_2_1_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/161494.161501"},{"key":"e_1_3_2_1_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/268946.268979"},{"key":"e_1_3_2_1_23_2","volume-title":"Capability Based Computer Systems","author":"Levy H.","year":"1984","unstructured":"H. Levy , editor. Capability Based Computer Systems . Digital Press , 1984 .]] H. Levy, editor. Capability Based Computer Systems. Digital Press, 1984.]]"},{"key":"e_1_3_2_1_24_2","first-page":"260","volume-title":"ECOOP Proceedings, LNCS 821","author":"Lopez G.","unstructured":"G. Lopez , B. Freeman-Benson , and A. Borning . Constraints and object identity . In ECOOP Proceedings, LNCS 821 , pages 260 - 279 . Springer-Verlag, Bologna , Italy, July I994.]] G. Lopez, B. Freeman-Benson, and A. Borning. Constraints and object identity. In ECOOP Proceedings, LNCS 821, pages 260-279. Springer-Verlag, Bologna, Italy, July I994.]]"},{"issue":"1","key":"e_1_3_2_1_25_2","first-page":"359","article-title":"Omniware","volume":"1","author":"Lucco S.","year":"1995","unstructured":"S. Lucco , O. Sharp , and R. Wahbe . Omniware : A Universal Substrate for Web Programming. World Wide Web Journal , 1 ( 1 ): 359 - 368 , Dec. 1995 .]] S. Lucco, O. Sharp, and R. Wahbe. Omniware: A Universal Substrate for Web Programming. World Wide Web Journal, 1(1):359-368, Dec. 1995.]]","journal-title":"A Universal Substrate for Web Programming. World Wide Web Journal"},{"key":"e_1_3_2_1_26_2","volume-title":"Encyclopedia of Software Engineering","author":"McLean J.","year":"1994","unstructured":"J. McLean . Security models . In J. Marciniak, editor, Encyclopedia of Software Engineering . Wiley & amp; Sons, 1994 .]] J. McLean. Security models. In J. Marciniak, editor, Encyclopedia of Software Engineering. Wiley & Sons, 1994.]]"},{"key":"e_1_3_2_1_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/263699.263714"},{"key":"e_1_3_2_1_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/292540.292561"},{"key":"e_1_3_2_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1998.674834"},{"key":"e_1_3_2_1_30_2","doi-asserted-by":"publisher","DOI":"10.5555\/646155.679699"},{"key":"e_1_3_2_1_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/263699.263715"},{"key":"e_1_3_2_1_32_2","doi-asserted-by":"publisher","DOI":"10.5555\/786775.787215"},{"key":"e_1_3_2_1_33_2","volume-title":"Fifth Workshop on Foundations o~ Object-Oriented Languages","author":"Riecke J. C.","year":"1998","unstructured":"J. C. Riecke and C. A. Stone . Privacy via Subsumption . In Fifth Workshop on Foundations o~ Object-Oriented Languages , 1998 .]] J. C. Riecke and C. A. Stone. Privacy via Subsumption. In Fifth Workshop on Foundations o~ Object-Oriented Languages, 1998.]]"},{"key":"e_1_3_2_1_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_1_35_2","volume-title":"http:\/\/www.cs- .princeton.edu\/sip\/news\/apri129.html","author":"Secure Internet Programming Group","year":"1997","unstructured":"Secure Internet Programming Group . http:\/\/www.cs- .princeton.edu\/sip\/news\/apri129.html . 1997 .]] Secure Internet Programming Group. http:\/\/www.cs- .princeton.edu\/sip\/news\/apri129.html. 1997.]]"},{"key":"e_1_3_2_1_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/268946.268975"},{"key":"e_1_3_2_1_37_2","doi-asserted-by":"publisher","DOI":"10.5555\/792769.793678"},{"key":"e_1_3_2_1_38_2","volume-title":"Unifying genericitycombining the benefits of virtual types and parameterized classes, tn ECOOP Proceedings","author":"Thorup K. K.","year":"1999","unstructured":"K. K. Thorup and M. Torgersen . Unifying genericitycombining the benefits of virtual types and parameterized classes, tn ECOOP Proceedings . Springer-Verlag , Lisbon, Portugal , June 1999 .]] K. K. Thorup and M. Torgersen. Unifying genericitycombining the benefits of virtual types and parameterized classes, tn ECOOP Proceedings. Springer-Verlag, Lisbon, Portugal, June 1999.]]"},{"key":"e_1_3_2_1_39_2","volume-title":"IBM Research Report RC","author":"Tip F.","year":"1998","unstructured":"F. Tip , C. Laffra , P. F. Sweeney , and D. Streeter . Size matters: Reducing the size of java class file archives. Technical report , IBM Research Report RC 21321, Oct. 1998 .]] F. Tip, C. Laffra, P. F. Sweeney, and D. Streeter. Size matters: Reducing the size of java class file archives. Technical report, IBM Research Report RC 21321, Oct. 1998.]]"},{"key":"e_1_3_2_1_40_2","volume-title":"Manuscript","author":"Vitek J.","year":"1999","unstructured":"J. Vitek and C. Bryce . Secure mobile code: the JavaSeal experiment . Manuscript , 1999 .]] J. Vitek and C. Bryce. Secure mobile code: the JavaSeal experiment. Manuscript, 1999.]]"},{"key":"e_1_3_2_1_41_2","volume-title":"Objects at Large","author":"Vitek J.","year":"1997","unstructured":"J. Vitek , M. Serrano , and D. Thanos . Security and communication in mobile object systems . In D. Tsichritzis, editor, Objects at Large . University of Geneva , 1997 .]] J. Vitek, M. Serrano, and D. Thanos. Security and communication in mobile object systems. In D. Tsichritzis, editor, Objects at Large. University of Geneva, 1997.]]"},{"key":"e_1_3_2_1_42_2","series-title":"Lecture Notes in Computer Science, 1214~","doi-asserted-by":"crossref","DOI":"10.21236\/ADA486429","volume-title":"A type-based approach to program security","author":"Volpano D.","year":"1997","unstructured":"D. Volpano and G. Smith . A type-based approach to program security . Lecture Notes in Computer Science, 1214~ 1997 .]] D. Volpano and G. Smith. A type-based approach to program security. Lecture Notes in Computer Science, 1214~ 1997.]]"},{"key":"e_1_3_2_1_43_2","doi-asserted-by":"publisher","DOI":"10.1145\/300307.300311"},{"key":"e_1_3_2_1_44_2","doi-asserted-by":"publisher","DOI":"10.1145\/268998.266668"},{"key":"e_1_3_2_1_45_2","volume-title":"MIT","author":"Yellin F.","year":"1995","unstructured":"F. Yellin . Low level security in Java. In Fourth lnternational Conference on ~he World-Wide Web , MIT , Boston , Dec. 1995 .]] F. Yellin. Low level security in Java. In Fourth lnternational Conference on ~he World-Wide Web, MIT, Boston, Dec. 1995.]]"}],"event":{"name":"OOPSLA99: Conference on Object Oriented Programming Systems Languages and Applications","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"],"location":"Denver Colorado USA","acronym":"OOPSLA99"},"container-title":["Proceedings of the 14th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/320384.320392","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,4]],"date-time":"2023-09-04T11:53:02Z","timestamp":1693828382000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/320384.320392"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,10]]},"references-count":44,"alternative-id":["10.1145\/320384.320392","10.1145\/320384"],"URL":"https:\/\/doi.org\/10.1145\/320384.320392","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/320385.320392","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[1999,10]]},"assertion":[{"value":"1999-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}