{"id":"https://openalex.org/W2148222113","doi":"https://doi.org/10.1109/ladc.2009.13","title":"A Proof-Carrying-Code Infrastructure for Resources","display_name":"A Proof-Carrying-Code Infrastructure for Resources","publication_year":2009,"publication_date":"2009-09-01","ids":{"openalex":"https://openalex.org/W2148222113","doi":"https://doi.org/10.1109/ladc.2009.13","mag":"2148222113"},"language":"en","primary_location":{"id":"doi:10.1109/ladc.2009.13","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ladc.2009.13","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 Fourth Latin-American Symposium on Dependable Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070090145","display_name":"Hans\u2010Wolfgang Loidl","orcid":"https://orcid.org/0000-0001-6318-1732"},"institutions":[{"id":"https://openalex.org/I8204097","display_name":"Ludwig-Maximilians-Universit\u00e4t M\u00fcnchen","ror":"https://ror.org/05591te55","country_code":"DE","type":"education","lineage":["https://openalex.org/I8204097"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Hans-Wolfgang Loidl","raw_affiliation_strings":["Institut f\u00fcr Informatik, Ludwig Maximilians Universit\u00e4t, Munchen, Germany"],"affiliations":[{"raw_affiliation_string":"Institut f\u00fcr Informatik, Ludwig Maximilians Universit\u00e4t, Munchen, Germany","institution_ids":["https://openalex.org/I8204097"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051904275","display_name":"Kenneth MacKenzie","orcid":null},"institutions":[{"id":"https://openalex.org/I98677209","display_name":"University of Edinburgh","ror":"https://ror.org/01nrxwf90","country_code":"GB","type":"education","lineage":["https://openalex.org/I98677209"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Kenneth MacKenzie","raw_affiliation_strings":["Laboratory of the Foundations of Computer Science, School of Informatics, University of Edinburgh, Edinburgh, UK"],"affiliations":[{"raw_affiliation_string":"Laboratory of the Foundations of Computer Science, School of Informatics, University of Edinburgh, Edinburgh, UK","institution_ids":["https://openalex.org/I98677209"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066882713","display_name":"Steffen Jost","orcid":"https://orcid.org/0000-0002-1807-9357"},"institutions":[{"id":"https://openalex.org/I16835326","display_name":"University of St Andrews","ror":"https://ror.org/02wn5qz54","country_code":"GB","type":"education","lineage":["https://openalex.org/I16835326"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Steffen Jost","raw_affiliation_strings":["School of Computer Science, University of Saint Andrews, Saint Andrews, Fife, UK"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, University of Saint Andrews, Saint Andrews, Fife, UK","institution_ids":["https://openalex.org/I16835326"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075091834","display_name":"Lennart Beringer","orcid":"https://orcid.org/0000-0002-1570-3492"},"institutions":[{"id":"https://openalex.org/I8204097","display_name":"Ludwig-Maximilians-Universit\u00e4t M\u00fcnchen","ror":"https://ror.org/05591te55","country_code":"DE","type":"education","lineage":["https://openalex.org/I8204097"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Lennart Beringer","raw_affiliation_strings":["Institut f\u00fcr Informatik, Ludwig Maximilians Universit\u00e4t, Munchen, Germany"],"affiliations":[{"raw_affiliation_string":"Institut f\u00fcr Informatik, Ludwig Maximilians Universit\u00e4t, Munchen, Germany","institution_ids":["https://openalex.org/I8204097"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5070090145"],"corresponding_institution_ids":["https://openalex.org/I8204097"],"apc_list":null,"apc_paid":null,"fwci":0.3428,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.65642035,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"3452","issue":null,"first_page":"127","last_page":"134"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10126","display_name":"Logic, programming, and type systems","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8417819142341614},{"id":"https://openalex.org/keywords/dependability","display_name":"Dependability","score":0.7711723446846008},{"id":"https://openalex.org/keywords/heap","display_name":"Heap (data structure)","score":0.6768738031387329},{"id":"https://openalex.org/keywords/certificate","display_name":"Certificate","score":0.6331542134284973},{"id":"https://openalex.org/keywords/certificate-authority","display_name":"Certificate authority","score":0.5910507440567017},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.547650933265686},{"id":"https://openalex.org/keywords/dead-code","display_name":"Dead code","score":0.5377395749092102},{"id":"https://openalex.org/keywords/unreachable-code","display_name":"Unreachable code","score":0.5116825103759766},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.5011663436889648},{"id":"https://openalex.org/keywords/redundant-code","display_name":"Redundant code","score":0.4806769788265228},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4154312014579773},{"id":"https://openalex.org/keywords/code-generation","display_name":"Code generation","score":0.3772323429584503},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.34337401390075684},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.28350311517715454},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.2602996826171875},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.22413423657417297},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.11910450458526611},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.09641113877296448}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8417819142341614},{"id":"https://openalex.org/C77019957","wikidata":"https://www.wikidata.org/wiki/Q2689057","display_name":"Dependability","level":2,"score":0.7711723446846008},{"id":"https://openalex.org/C134757568","wikidata":"https://www.wikidata.org/wiki/Q274089","display_name":"Heap (data structure)","level":2,"score":0.6768738031387329},{"id":"https://openalex.org/C96865113","wikidata":"https://www.wikidata.org/wiki/Q2946816","display_name":"Certificate","level":2,"score":0.6331542134284973},{"id":"https://openalex.org/C93636275","wikidata":"https://www.wikidata.org/wiki/Q196776","display_name":"Certificate authority","level":4,"score":0.5910507440567017},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.547650933265686},{"id":"https://openalex.org/C47434764","wikidata":"https://www.wikidata.org/wiki/Q1770035","display_name":"Dead code","level":5,"score":0.5377395749092102},{"id":"https://openalex.org/C50951305","wikidata":"https://www.wikidata.org/wiki/Q2482534","display_name":"Unreachable code","level":5,"score":0.5116825103759766},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.5011663436889648},{"id":"https://openalex.org/C151578736","wikidata":"https://www.wikidata.org/wiki/Q1251793","display_name":"Redundant code","level":4,"score":0.4806769788265228},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4154312014579773},{"id":"https://openalex.org/C133162039","wikidata":"https://www.wikidata.org/wiki/Q1061077","display_name":"Code generation","level":3,"score":0.3772323429584503},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.34337401390075684},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.28350311517715454},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2602996826171875},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.22413423657417297},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.11910450458526611},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.09641113877296448},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ladc.2009.13","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ladc.2009.13","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 Fourth Latin-American Symposium on Dependable Computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6200000047683716,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W69024957","https://openalex.org/W94295739","https://openalex.org/W1482715091","https://openalex.org/W1536059726","https://openalex.org/W1544023751","https://openalex.org/W1554855925","https://openalex.org/W1564069522","https://openalex.org/W1568405722","https://openalex.org/W1588567874","https://openalex.org/W1816055196","https://openalex.org/W1898302081","https://openalex.org/W1974984092","https://openalex.org/W1976394633","https://openalex.org/W1983134029","https://openalex.org/W1987927249","https://openalex.org/W1997712902","https://openalex.org/W2003295303","https://openalex.org/W2009375997","https://openalex.org/W2010059824","https://openalex.org/W2012069736","https://openalex.org/W2034711041","https://openalex.org/W2051600983","https://openalex.org/W2060213695","https://openalex.org/W2068055184","https://openalex.org/W2076285066","https://openalex.org/W2091257550","https://openalex.org/W2103960969","https://openalex.org/W2114558609","https://openalex.org/W2114895548","https://openalex.org/W2114938959","https://openalex.org/W2115401928","https://openalex.org/W2119442768","https://openalex.org/W2125218864","https://openalex.org/W2128180740","https://openalex.org/W2142191991","https://openalex.org/W2150769115","https://openalex.org/W2159897916","https://openalex.org/W2171496589","https://openalex.org/W2194223632","https://openalex.org/W2737447633","https://openalex.org/W4231861573","https://openalex.org/W6638257706"],"related_works":["https://openalex.org/W2161969548","https://openalex.org/W2036000779","https://openalex.org/W116913286","https://openalex.org/W4244016640","https://openalex.org/W2112669344","https://openalex.org/W3008325674","https://openalex.org/W1141223778","https://openalex.org/W1539844444","https://openalex.org/W2045218056","https://openalex.org/W179346248"],"abstract_inverted_index":{"This":[0,39,115],"paper":[1],"tackles":[2],"the":[3,12,64,81,108,113,123],"issue":[4],"of":[5,8,14,32,35,52,84,97],"increasing":[6],"dependability":[7],"distributed":[9],"systems":[10],"in":[11,71],"presence":[13],"mobile":[15,36,117],"code.":[16],"To":[17],"this":[18,105],"end":[19],"we":[20,68],"present":[21],"a":[22,41,45,50,72,85,91,94],"complete":[23],"proof-carrying-code":[24],"(PCC)":[25],"infrastructure":[26],"for":[27,44],"independent":[28,57],"and":[29,56,102],"automatic":[30],"certification":[31],"resource":[33],"bounds":[34,79],"JVM":[37],"programs.":[38],"includes":[40],"certifying":[42],"compiler":[43],"high-level":[46],"language,":[47,89],"which":[48],"produces":[49],"certificate":[51,58,92,106],"bounded":[53,99],"heap":[54,82,100],"consumption,":[55],"validation,":[59],"realised":[60],"via":[61],"proof-checking,":[62],"on":[63,80,122],"code-consumer":[65],"side.":[66],"Thus,":[67],"are":[69],"now":[70],"position":[73],"to":[74],"automatically":[75],"infer":[76],"linear":[77],"upper":[78],"consumption":[83,101],"strict,":[86],"first-order":[87],"functional":[88],"generate":[90],"encoding":[93],"formal":[95],"proof":[96],"such":[98],"independently":[103],"validate":[104],"at":[107],"consumer":[109],"side":[110],"by":[111],"checking":[112],"certificate.":[114],"prevents":[116],"code":[118],"from":[119],"exhausting":[120],"resources":[121],"local":[124],"machine.":[125]},"counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
