{"id":"https://openalex.org/W2073650481","doi":"https://doi.org/10.1145/319195.319219","title":"Security versus performance tradeoffs in RPC implementations for safe language systems","display_name":"Security versus performance tradeoffs in RPC implementations for safe language systems","publication_year":1998,"publication_date":"1998-09-07","ids":{"openalex":"https://openalex.org/W2073650481","doi":"https://doi.org/10.1145/319195.319219","mag":"2073650481"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1145/319195.319219","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/319195.319219","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://dl.acm.org/doi/pdf/10.1145/319195.319219","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108527908","display_name":"Chi-Chao Chang","orcid":null},"institutions":[{"id":"https://openalex.org/I205783295","display_name":"Cornell University","ror":"https://ror.org/05bnh6r87","country_code":"US","type":"education","lineage":["https://openalex.org/I205783295"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chi-Chao Chang","raw_affiliation_strings":["Department of Computer Science, Cornell University, Ithaca, NY"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Cornell University, Ithaca, NY","institution_ids":["https://openalex.org/I205783295"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068427725","display_name":"Grzegorz Czajkowski","orcid":null},"institutions":[{"id":"https://openalex.org/I205783295","display_name":"Cornell University","ror":"https://ror.org/05bnh6r87","country_code":"US","type":"education","lineage":["https://openalex.org/I205783295"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Grzegorz Czajkowski","raw_affiliation_strings":["Department of Computer Science, Cornell University, Ithaca, NY"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Cornell University, Ithaca, NY","institution_ids":["https://openalex.org/I205783295"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016958899","display_name":"Chris Hawblitzel","orcid":"https://orcid.org/0000-0002-5676-0362"},"institutions":[{"id":"https://openalex.org/I205783295","display_name":"Cornell University","ror":"https://ror.org/05bnh6r87","country_code":"US","type":"education","lineage":["https://openalex.org/I205783295"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chris Hawblitzel","raw_affiliation_strings":["Department of Computer Science, Cornell University, Ithaca, NY"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Cornell University, Ithaca, NY","institution_ids":["https://openalex.org/I205783295"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023330287","display_name":"Deyu Hu","orcid":null},"institutions":[{"id":"https://openalex.org/I205783295","display_name":"Cornell University","ror":"https://ror.org/05bnh6r87","country_code":"US","type":"education","lineage":["https://openalex.org/I205783295"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Deyu Hu","raw_affiliation_strings":["Department of Computer Science, Cornell University, Ithaca, NY"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Cornell University, Ithaca, NY","institution_ids":["https://openalex.org/I205783295"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5088022192","display_name":"Thorsten von Eicken","orcid":null},"institutions":[{"id":"https://openalex.org/I205783295","display_name":"Cornell University","ror":"https://ror.org/05bnh6r87","country_code":"US","type":"education","lineage":["https://openalex.org/I205783295"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Thorsten von Eicken","raw_affiliation_strings":["Department of Computer Science, Cornell University, Ithaca, NY"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Cornell University, Ithaca, NY","institution_ids":["https://openalex.org/I205783295"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.228,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":2,"citation_normalized_percentile":{"value":0.330943,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":63,"max":67},"biblio":{"volume":null,"issue":null,"first_page":"158","last_page":"161"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9978,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9948,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.4253756}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5647423},{"id":"https://openalex.org/C2778805511","wikidata":"https://www.wikidata.org/wiki/Q1713","display_name":"Citation","level":2,"score":0.532357},{"id":"https://openalex.org/C161191863","wikidata":"https://www.wikidata.org/wiki/Q199655","display_name":"Library science","level":1,"score":0.48860222},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.4253756},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.13429564}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1145/319195.319219","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/319195.319219","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1145/319195.319219","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/319195.319219","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":9,"referenced_works":["https://openalex.org/W1482251990","https://openalex.org/W1550695625","https://openalex.org/W1967800745","https://openalex.org/W1987379210","https://openalex.org/W2049206342","https://openalex.org/W2067580212","https://openalex.org/W2120284965","https://openalex.org/W2154207621","https://openalex.org/W2169011679"],"related_works":["https://openalex.org/W797688974","https://openalex.org/W4391375266","https://openalex.org/W4238532390","https://openalex.org/W2977179488","https://openalex.org/W2961779879","https://openalex.org/W2748952813","https://openalex.org/W2188872161","https://openalex.org/W2144453115","https://openalex.org/W2128223750","https://openalex.org/W2120447654"],"abstract_inverted_index":{"Article":[0],"Free":[1],"Access":[2],"Share":[3],"on":[4,131,184],"Security":[5],"versus":[6],"performance":[7],"tradeoffs":[8],"in":[9,193],"RPC":[10],"implementations":[11],"for":[12,133],"safe":[13],"language":[14],"systems":[15],"Authors:":[16],"Chi-Chao":[17],"Chang":[18],"Department":[19,27,39,47,59,67,79,87,100,108],"of":[20,28,40,48,60,68,80,88,101,109,124],"Computer":[21,29,41,49,61,69,81,89,102,110],"Science,":[22,30,42,50,62,70,82,90,103,111],"Cornell":[23,31,43,51,63,71,83,91,104,112],"University,":[24,32,44,52,64,72,84,92,105,113],"Ithaca,":[25,33,45,53,65,73,85,93,106,114],"NY":[26,46,66,86,107],"NYView":[34,54,74,94,115],"Profile":[35,55,75,95,116],",":[36,56,76,96],"Grzegorz":[37],"Czajkowski":[38],"Chris":[57],"Hawblitzel":[58],"Deyu":[77],"Hu":[78],"Thorsten":[97],"von":[98],"Eicken":[99],"Authors":[117],"Info":[118],"&":[119],"Claims":[120],"EW":[121],"8:":[122],"Proceedings":[123],"the":[125,185],"8th":[126],"ACM":[127],"SIGOPS":[128],"European":[129],"workshop":[130],"Support":[132],"composing":[134],"distributed":[135],"applicationsSeptember":[136],"1998":[137],"Pages":[138],"158\u2013161https://doi.org/10.1145/319195.319219Online:07":[139],"September":[140],"1998Publication":[141],"History":[142],"1citation246DownloadsMetricsTotal":[143],"Citations1Total":[144],"Downloads246Last":[145],"12":[146],"Months2Last":[147],"6":[148],"weeks1":[149],"Get":[150],"Citation":[151,153,190],"AlertsNew":[152,189],"Alert":[154],"added!This":[155],"alert":[156,181],"has":[157,176],"been":[158,177],"successfully":[159],"added":[160],"and":[161],"will":[162,166],"be":[163,167],"sent":[164],"to:You":[165],"notified":[168],"whenever":[169],"a":[170,202],"record":[171],"that":[172],"you":[173],"have":[174],"chosen":[175],"cited.To":[178],"manage":[179],"your":[180,195],"preferences,":[182],"click":[183],"button":[186],"below.Manage":[187],"my":[188],"Alert!Please":[191],"log":[192],"to":[194,198,200],"account":[196],"Save":[197],"BinderSave":[199],"BinderCreate":[201],"New":[203],"BinderNameCancelCreateExport":[204],"CitationPublisher":[205],"SiteeReaderPDF":[206]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2073650481","counts_by_year":[],"updated_date":"2024-12-17T10:22:46.950218","created_date":"2016-06-24"}