default search action
Secure Internet Programming 1999
The idea for this book arose from a number of discussions and presentations given at two ECOOP'98 workshops: the Workshop on Distributed Object Security and the Workshop on Mobility: Secure Internet Mobile Computation.
Foundations
- Vipin Swarup, F. Javier Thayer:
Trust: Benefits, Models, and Mechanisms. 3-18 - Martín Abadi:
Protection in Programming-Language Translations. 19-34 - Massimo Ancona, Walter Cazzola, Eduardo B. Fernández:
Reflective Authorization Systems: Possibilities, Benefits, and Drawbacks. 35-49 - Luca Cardelli:
Abstractions for Mobile Computation. 51-94 - Matthew Hennessy, James Riely:
Type-Safe Execution of Mobile Agents in Anonymous Networks. 95-115 - Rocco De Nicola, Gian-Luigi Ferrari, Rosario Pugliese:
Types as Specifications of Access Policies. 118-146 - Xavier Leroy, François Rouaix:
Security Properties of Typed Applets. 147-182
Concepts
- Matt Blaze, Joan Feigenbaum, Angelos D. Keromytis:
The Role of Trust Management in Distributed Systems Security. 185-210 - Tuomas Aura:
Distributed Access-Rights Managements with Delegations Certificates. 211-235 - Gerald Brose:
A View-Based Access Control Model for CORBA. 237-252 - Christian F. Tschudin:
Apoptosis - the Programmed Death of Distributed Services. 253-260 - Bennet S. Yee:
A Sanctuary for Mobile Agents. 261-273 - Volker Roth:
Mutual Protection of Co-operating Agents. 275-285
Implementations
- Trent Jaeger:
Access Control in Configurable Systems. 289-316 - Robert Grimm, Brian N. Bershad:
Providing Policy-Neutral and Transparent Access Control in Extensible Systems. 317-338 - Michael B. Jones:
Interposition Agents: Transparently Interposing User Code at the System Interface. 339-368 - Thorsten von Eicken, Chi-Chao Chang, Grzegorz Czajkowski, Chris Hawblitzel, Deyu Hu, Dan Spoonhower:
J-Kernel: A Capability-Based Operating System for Java. 369-393 - Leendert van Doorn, Martín Abadi, Michael Burrows, Edward Wobber:
Secure Network Objects. 395-412 - Guy Edjlali, Anurag Acharya, Vipin Chaudhary:
History-Based Access Control for Mobile Code. 413-431 - D. Scott Alexander, William A. Arbaugh, Angelos D. Keromytis, Jonathan M. Smith:
Security in Active Networks. 433-451 - Jarle Hulaas, Alex Villazón, Jürgen Harms:
Using Interfaces to Specify Access Rights. 453-468 - Uwe G. Wilhelm, Sebastian Staamann, Levente Buttyán:
Introducing Trusted Third Parties to the Mobile Agent Paradigm. 469-489
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.