G. Back, W. C. Hsieh, and J. Lepreau, Processes in KaffeOS: Isolation, Resource Management , and Sharing in Java, The 4th Symposium on Operating Systems Design and Implementation, 2000.

N. Bagaratnan and S. B. Byrne, Resource Access Control for an Internet UserAgent, The 3th USENIX Conference on Object-Oriented Technologie and Systems, 1997.

G. Czajkowski and T. Von-eicken, JRes: a Resource Accounting Interface for Java, ACM OOPSLA Conference, 1998.

D. Evans and A. Twyman, Flexible policy-directed code safety, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344), 1999.
DOI : 10.1109/SECPRI.1999.766716

F. Chang, A. Itzkovitz, and V. Karamcheti, User-level Resource-constrained Sandboxing, The 4th USENIX Windows Systems Symposium, 2000.

L. Gong, Java security: present and near future, IEEE Micro, vol.17, issue.3, pp.14-19, 1997.
DOI : 10.1109/40.591650

L. Gong and R. Schemers, Implementing Protection Domains in the Java Development Kit 1.2, Internet Society Symposium on Network and Distributed System Scurity, 1998.

N. L. , S. , and F. Guidec, A Contract-Based Approach of Resource-Constrained Software Deployment, Proceedings of the First International IFIP/ACM Working Conference on Component Deployment (CD'2002, 2002.
URL : https://hal.archives-ouvertes.fr/hal-00342141

N. L. , S. , and F. Guidec, JAMUS: Java Accommodation of Mobile Untrusted Software, 4th EurOpen/USENIX Conference (NordU'2002, 2002.
URL : https://hal.archives-ouvertes.fr/hal-00342143