Resource Access Control for an Internet UserAgent, Third USENIX Conference on Object-Oriented Technologie and Systems, 1997. ,
Processes in KaffeOS: Isolation , Resource Management, and Sharing in Java, 4th Symposium on Operating Systems Design and Implementation, 2000. ,
Making Java Applications Mobile or Persistent, 6th USENIX Conference on Object-Oriented Technologies and Systems (COOTS'01), 2001. ,
Techniques for the Design of Java Operating Systems, USENIX Annual Technical Conference, 2000. ,
User-level Resourceconstrained Sandboxing, 4'th USENIX Windows Systems Symposium, 2000. ,
JRes: a Resource Accounting Interface for Java, ACM OOPSLA Conference, 1998. ,
Flexible policy-directed code safety, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344), 1999. ,
DOI : 10.1109/SECPRI.1999.766716
Policy-Directed Code Safety, 2000. ,
DOI : 10.1109/secpri.1999.766716
Mobile agents: Motivations and State of the Art, 2000. ,
Java security: present and near future, IEEE Micro, vol.17, issue.3, pp.14-19, 1997. ,
DOI : 10.1109/40.591650
Implementing Protection Domains in the Java Development Kit 1.2, Internet Society Symposium on Network and Distributed System Scurity, 1998. ,
Implementing Multiple Protection Domains in Java, USENIX Annual Technical Conference, 1998. ,
A resource broker model with integrated reservation scheme, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532), pp.859-862, 2000. ,
DOI : 10.1109/ICME.2000.871495
Design Issues in Mobile-Agent Programming Systems, IEEE Concurrency, vol.6, issue.3, pp.52-61, 1998. ,
Providing Fine-Grained Access Control for Java Programs, The 13th Conference on Object-Oriented Programming, ECOOP'99Ven98] Bill Veners. Inside the Java 2 Virtual Machine . Mac Graw-Hill, 1998. ,
DOI : 10.1007/3-540-48743-3_21
The Glasshouse: a Reflective Container for Mobile Code, 7th ECOOP Workshop on Mobile Object Systems (MOS'01): Development of Robust and High Confidence Agent Applications, 2001. ,