{"id":"https://openalex.org/W2018511218","doi":"https://doi.org/10.1145/1040294.1040302","title":"Automated and certified conformance to responsiveness policies","display_name":"Automated and certified conformance to responsiveness policies","publication_year":2005,"publication_date":"2005-01-10","ids":{"openalex":"https://openalex.org/W2018511218","doi":"https://doi.org/10.1145/1040294.1040302","mag":"2018511218"},"language":"en","primary_location":{"id":"doi:10.1145/1040294.1040302","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1040294.1040302","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2005 ACM SIGPLAN international workshop on Types in languages design and implementation","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052513728","display_name":"Joseph C. Vanderwaart","orcid":null},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Joseph C. Vanderwaart","raw_affiliation_strings":["Carnegie Mellon University"],"affiliations":[{"raw_affiliation_string":"Carnegie Mellon University","institution_ids":["https://openalex.org/I74973139"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045900536","display_name":"Karl Crary","orcid":"https://orcid.org/0000-0002-1556-2183"},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Karl Crary","raw_affiliation_strings":["Carnegie Mellon University"],"affiliations":[{"raw_affiliation_string":"Carnegie Mellon University","institution_ids":["https://openalex.org/I74973139"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5052513728"],"corresponding_institution_ids":["https://openalex.org/I74973139"],"apc_list":null,"apc_paid":null,"fwci":2.1938,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.88748171,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"79","last_page":"90"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10126","display_name":"Logic, programming, and type systems","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8608236908912659},{"id":"https://openalex.org/keywords/certification","display_name":"Certification","score":0.6579329967498779},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4539286494255066},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.443293035030365},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.42749685049057007},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.42591768503189087},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.41954925656318665},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.402564138174057},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.37191981077194214},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3420991897583008},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.10354939103126526}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8608236908912659},{"id":"https://openalex.org/C46304622","wikidata":"https://www.wikidata.org/wiki/Q374814","display_name":"Certification","level":2,"score":0.6579329967498779},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4539286494255066},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.443293035030365},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.42749685049057007},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42591768503189087},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.41954925656318665},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.402564138174057},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.37191981077194214},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3420991897583008},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.10354939103126526},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1040294.1040302","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1040294.1040302","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2005 ACM SIGPLAN international workshop on Types in languages design and implementation","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7099999785423279,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W127506714","https://openalex.org/W1511303081","https://openalex.org/W1588567874","https://openalex.org/W1600803309","https://openalex.org/W1603734370","https://openalex.org/W1766430671","https://openalex.org/W2010059824","https://openalex.org/W2034711041","https://openalex.org/W2044253896","https://openalex.org/W2056656593","https://openalex.org/W2066550846","https://openalex.org/W2068055184","https://openalex.org/W2069107692","https://openalex.org/W2069954929","https://openalex.org/W2140566629","https://openalex.org/W2561675875","https://openalex.org/W6605257785","https://openalex.org/W6635259338"],"related_works":["https://openalex.org/W2066052364","https://openalex.org/W2023743128","https://openalex.org/W4243365217","https://openalex.org/W2224296908","https://openalex.org/W3109981693","https://openalex.org/W2381980429","https://openalex.org/W2384206113","https://openalex.org/W645983410","https://openalex.org/W2401692867","https://openalex.org/W2057053421"],"abstract_inverted_index":{"Certified":[0],"code":[1,9,28,67,135],"systems":[2],"protect":[3],"computers":[4],"from":[5],"faulty":[6],"or":[7],"malicious":[8],"by":[10,17,84],"requiring":[11],"untrusted":[12,42,66],"software":[13],"to":[14,30,47,68,109,155,162],"be":[15,130],"accompanied":[16],"checkable":[18],"evidence":[19],"of":[20,41,55,122,141],"its":[21],"safety.":[22],"This":[23,118],"paper":[24],"presents":[25],"a":[26,31,59,75,85,95,99],"certified":[27],"solution":[29],"problem":[32],"in":[33,125,160],"grid":[34,56],"computing,":[35],"namely,":[36],"controlling":[37],"the":[38,49,65,126,139],"CPU":[39],"usage":[40],"programs.":[43],"Specifically,":[44],"we":[45,91],"propose":[46],"endow":[48],"runtime":[50],"system":[51],"supervising":[52],"local":[53],"execution":[54],"programs":[57],"with":[58,72,79],"trusted":[60],"\"yield\"":[61],"operation,":[62],"and":[63,106,149],"require":[64],"execute":[69],"this":[70,80],"operation":[71],"at":[73],"least":[74],"certain":[76],"frequency.":[77],"Compliance":[78],"requirement":[81],"is":[82],"enforced":[83],"special":[86],"typed":[87],"assembly":[88],"language,":[89],"which":[90],"describe.We":[92],"also":[93],"describe":[94],"compilation":[96],"strategy":[97],"for":[98,144],"general-purpose":[100],"programming":[101],"language":[102],"that":[103,120,132],"can":[104,129],"enforce":[105],"certify":[107],"conformance":[108],"such":[110],"policies":[111],"automatically":[112],"without":[113],"any":[114],"sophisticated":[115],"program":[116],"analyses.":[117],"means":[119],"owners":[121],"hosts":[123],"participating":[124],"computation":[127],"network":[128],"confident":[131],"executing":[133],"foreign":[134],"will":[136],"not":[137,153],"compromise":[138],"availability":[140],"their":[142,146,157],"machines":[143],"running":[145],"own":[147],"processes,":[148],"application":[150],"programmers":[151],"do":[152],"need":[154],"modify":[156],"coding":[158],"style":[159],"order":[161],"produce":[163],"compliant":[164],"software.":[165]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
