[{"text":"\n\n\nCédric Fournet , Andrew D. Gordon, Stack inspection: Theory and variants, ACM Transactions on Programming Languages and Systems (TOPLAS), v.25 n.3, p.360-399, May 2003   [doi>10.1145/641909.641912]\n\n","citation":"641912","doi":"http://doi.acm.org/10.1145/641909.641912"},{"text":"\n\n\nNorm Hardy, The Confused Deputy: (or why capabilities might have been invented), ACM SIGOPS Operating Systems Review, v.22 n.4, p.36-38, Oct. 1988 \n\n","citation":"871709"},{"text":"\n\n\nMark Samuel Miller , Jonathan S. Shapiro, Robust composition: towards a unified approach to access control and concurrency control, Johns Hopkins University, Baltimore, MD, 2006 \n\n","citation":"1269618"},{"text":"\n\nJ. H. Saltzer and M. D. Schroeder. The protection of information in computer systems, 1975.\n\n"},{"text":"\n\n\nPierangela Samarati , Sabrina De Capitani di Vimercati, Access Control: Policies, Models, and Mechanisms, Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures, p.137-196, September 01, 2000 \n\n","citation":"683112"},{"text":"\n\n\nÉric Tanter, Expressive scoping of dynamically-deployed aspects, Proceedings of the 7th international conference on Aspect-oriented software development, March 31-April 04, 2008, Brussels, Belgium   [doi>10.1145/1353482.1353503]\n\n","citation":"1353503","doi":"http://doi.acm.org/10.1145/1353482.1353503"},{"text":"\n\n\nRodolfo Toledo , Angel Nunez , Eric Tanter , Jacques Noye, Aspectizing Java Access Control, IEEE Transactions on Software Engineering, v.38 n.1, p.101-117, January 2012   [doi>10.1109/TSE.2011.6]\n\n","citation":"2122546"},{"text":"\n\nD. Wallach and E. Felten. Understanding Java stack inspection. In Proceedings of the IEEE Symposium on Security and Privacy, pages 52--63, 1998.\n\n"}]