{"id":"https://openalex.org/W2072722679","doi":"https://doi.org/10.1145/353171.353195","title":"Application isolation in the Java Virtual Machine","display_name":"Application isolation in the Java Virtual Machine","publication_year":2000,"publication_date":"2000-10-01","ids":{"openalex":"https://openalex.org/W2072722679","doi":"https://doi.org/10.1145/353171.353195","mag":"2072722679"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/353171.353195","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068427725","display_name":"Grzegorz Czajkowski","orcid":null},"institutions":[{"id":"https://openalex.org/I1342911587","display_name":"Oracle (United States)","ror":"https://ror.org/006c77m33","country_code":"US","type":"company","lineage":["https://openalex.org/I1342911587"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Grzegorz Czajkowski","raw_affiliation_strings":["Sun Microsystems Laboratories, 2600 Casey Avenue, Mountain View, CA#TAB#"],"affiliations":[{"raw_affiliation_string":"Sun Microsystems Laboratories, 2600 Casey Avenue, Mountain View, CA#TAB#","institution_ids":["https://openalex.org/I1342911587"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5068427725"],"corresponding_institution_ids":["https://openalex.org/I1342911587"],"apc_list":null,"apc_paid":null,"fwci":2.946,"has_fulltext":false,"cited_by_count":75,"citation_normalized_percentile":{"value":0.913667,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"354","last_page":"366"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9989,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9982,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/human-multitasking","display_name":"Human multitasking","score":0.6963948},{"id":"https://openalex.org/keywords/isolation","display_name":"Isolation","score":0.6810085},{"id":"https://openalex.org/keywords/loader","display_name":"Loader","score":0.5718371},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.43250552}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.88644254},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.7654187},{"id":"https://openalex.org/C107418235","wikidata":"https://www.wikidata.org/wiki/Q1520565","display_name":"Human multitasking","level":2,"score":0.6963948},{"id":"https://openalex.org/C2775941552","wikidata":"https://www.wikidata.org/wiki/Q25212305","display_name":"Isolation (microbiology)","level":2,"score":0.6810085},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6107788},{"id":"https://openalex.org/C2779041774","wikidata":"https://www.wikidata.org/wiki/Q650550","display_name":"Loader","level":2,"score":0.5718371},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.55505276},{"id":"https://openalex.org/C132106392","wikidata":"https://www.wikidata.org/wiki/Q1373903","display_name":"Real time Java","level":3,"score":0.5219271},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.49638492},{"id":"https://openalex.org/C174954855","wikidata":"https://www.wikidata.org/wiki/Q7623626","display_name":"strictfp","level":4,"score":0.45983097},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.45450762},{"id":"https://openalex.org/C181907185","wikidata":"https://www.wikidata.org/wiki/Q1100098","display_name":"Java concurrency","level":4,"score":0.4489717},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.4460856},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.43250552},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4316614},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.43011883},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3752429},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1280759},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.12073785},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.10303971},{"id":"https://openalex.org/C89423630","wikidata":"https://www.wikidata.org/wiki/Q7193","display_name":"Microbiology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C180747234","wikidata":"https://www.wikidata.org/wiki/Q23373","display_name":"Cognitive psychology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/353171.353195","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":24,"referenced_works":["https://openalex.org/W108020401","https://openalex.org/W1530190941","https://openalex.org/W1533109738","https://openalex.org/W1650006494","https://openalex.org/W168248273","https://openalex.org/W1976931398","https://openalex.org/W1995424528","https://openalex.org/W2035979763","https://openalex.org/W2049962807","https://openalex.org/W2079029390","https://openalex.org/W2083469471","https://openalex.org/W2083803628","https://openalex.org/W2095219028","https://openalex.org/W2098515008","https://openalex.org/W2098771596","https://openalex.org/W2099648702","https://openalex.org/W2111529536","https://openalex.org/W2120284965","https://openalex.org/W2140551865","https://openalex.org/W2158073797","https://openalex.org/W2170389900","https://openalex.org/W4206109200","https://openalex.org/W4238080674","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2541866089","https://openalex.org/W2396826581","https://openalex.org/W2388559359","https://openalex.org/W2386485387","https://openalex.org/W2367240299","https://openalex.org/W2348876595","https://openalex.org/W2342828752","https://openalex.org/W2160811054","https://openalex.org/W1987200495","https://openalex.org/W1491491228"],"abstract_inverted_index":{"To":[0],"date,":[1],"systems":[2],"offering":[3,98],"multitasking":[4],"for":[5,18],"the":[6,38,52,165,170],"Java\u2122":[7],"programming":[8],"language":[9],"either":[10],"use":[11,132],"one":[12,15,122],"process":[13],"or":[14],"class":[16],"loader":[17],"each":[19,142],"application.":[20],"Both":[21],"approaches":[22],"are":[23,135,154,174],"unsatisfactory.":[24],"Using":[25],"operating":[26],"system":[27],"processes":[28],"is":[29,105,118,160],"expensive,":[30],"scales":[31],"poorly":[32],"and":[33,55,59,111,137,156],"does":[34],"not":[35],"fully":[36],"exploit":[37],"protection":[39],"features":[40],"inherent":[41],"in":[42,92],"a":[43,79,145],"safe":[44],"language.":[45],"Class":[46],"loaders":[47],"replicate":[48],"application":[49,143],"code,":[50],"obscure":[51],"type":[53],"system,":[54],"non-uniformly":[56],"treat":[57],"'trusted'":[58],"'untrusted'":[60],"classes,":[61],"which":[62],"leads":[63],"to":[64,119,169],"subtle,":[65],"but":[66],"nevertheless,":[67],"potentially":[68],"harmful":[69],"forms":[70],"of":[71,94,124,128,148,164],"undesirable":[72],"inter-application":[73],"interaction.In":[74],"this":[75],"paper":[76],"we":[77],"propose":[78],"novel,":[80],"simple":[81],"yet":[82],"powerful":[83],"solution.":[84],"The":[85,103,115],"new":[86],"model":[87],"improves":[88],"on":[89,108,112],"existing":[90],"designs":[91],"terms":[93],"resource":[95],"utilization":[96],"while":[97],"strong":[99],"isolation":[100],"among":[101],"applications.":[102],"approach":[104],"applicable":[106],"both":[107],"high-end":[109],"servers":[110],"small":[113],"devices.":[114],"main":[116],"idea":[117],"maintain":[120],"only":[121],"copy":[123,147],"every":[125],"class,":[126],"regardless":[127],"how":[129],"many":[130],"applications":[131],"it.":[133],"Classes":[134],"transparently":[136],"automatically":[138],"modified,":[139],"so":[140],"that":[141],"has":[144],"separate":[146],"its":[149],"static":[150],"fields.":[151],"Two":[152],"prototypes":[153],"described":[155],"selected":[157],"performance":[158],"data":[159],"analyzed.":[161],"Various":[162],"aspects":[163],"proposed":[166],"architectural":[167],"changes":[168],"Java":[171],"Virtual":[172],"Machine":[173],"discussed.":[175]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2072722679","counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":5}],"updated_date":"2025-01-18T02:05:06.653018","created_date":"2016-06-24"}