G. Back, W. C. Hsieh, and J. Lepreau, Processes in KaffeOS: Isolation, Resource Management, and Sharing in Java, 4th Symposium on Operating Systems Design and Implementation, 2000.

G. Back, P. Tullmann, L. Stoller, W. C. Hsieh, and J. Lepreau, Techniques for the Design of Java Operating Systems, USENIX Annual Technical Conference, 2000.

N. Bagaratnan and S. B. Byrne, Resource Access Control for an Internet UserAgent, Third USENIX Conference on Object-Oriented Technologie and Systems, 1997.

A. Beugnard, J. Jézéquel, N. Plouzeau, and D. Watkins, Making components contract aware, IEEE, pp.38-44, 1999.
DOI : 10.1109/2.774917

G. Czajkowski and T. Von-eicken, JRes: a Resource Accounting Interface for Java, ACM OOPSLA Conference, 1998.

D. Evans, Policy-Directed Code Safety, 2000.
DOI : 10.1109/secpri.1999.766716

D. Evans and A. Twyman, Flexible policy-directed code safety, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344), 1999.
DOI : 10.1109/SECPRI.1999.766716

F. Chang, A. Itzkovitz, and V. Karamcheti, User-level Resource-constrained Sandboxing qualitative and quantitative restrictions on CPU, network and memory, th USENIX Windows Systems Symposium This sandbox model is implemented under WindowsNT and Linux, 2000.

L. Gong, Java security: present and near future, IEEE Micro, vol.17, issue.3, pp.14-19, 1997.
DOI : 10.1109/40.591650

L. Gong and R. Schemers, Implementing Protection Domains in the Java Development Kit 1.2, Internet Society Symposium on Network and Distributed System Scurity, 1998.

C. Hawblitzel, C. Chang, G. Czajkowski, D. Hu, and T. Von-eicken, Implementing Multiple Protection Domains in Java, USENIX Annual Technical Conference, 1998.

J. Jézéquel, D. Deveaux, and Y. Le-traon, Reliable objects: lightweight testing for oo languages, IEEE Software, vol.18, issue.4, pp.76-83, 2001.
DOI : 10.1109/MS.2001.936221

K. Kim and K. Nahrstedt, A resource broker model with integrated reservation scheme, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532), pp.859-862, 2000.
DOI : 10.1109/ICME.2000.871495

U. Lindqvist, T. Olovsson, and E. Jonsson, An analysis of a secure system based on trusted components, Proceedings of 11th Annual Conference on Computer Assurance. COMPASS '96, pp.213-223, 1996.
DOI : 10.1109/CMPASS.1996.507889

B. Meyer, C. Mingins, and H. Schmidt, Providing trusted components to the industry, Computer, vol.31, issue.5, pp.104-119, 1998.
DOI : 10.1109/2.675643

R. Pandey and B. Hashii, Providing Fine-Grained Access Control for Java Programs, The 13th Conference on Object-Oriented Programming, ECOOP'99, 1999.
DOI : 10.1007/3-540-48743-3_21

C. Szyperski, Component Software: Beyond Object-Oriented Programming, 1998.

B. Veners, Inside the Java 2 Virtual Machine, 1998.