


default search action
Secure Internet Programming 1999
The idea for this book arose from a number of discussions and presentations given at two ECOOP'98 workshops: the Workshop on Distributed Object Security and the Workshop on Mobility: Secure Internet Mobile Computation.
Foundations
- Vipin Swarup, F. Javier Thayer:

Trust: Benefits, Models, and Mechanisms. 3-18 - Martín Abadi:

Protection in Programming-Language Translations. 19-34 - Massimo Ancona, Walter Cazzola, Eduardo B. Fernández:

Reflective Authorization Systems: Possibilities, Benefits, and Drawbacks. 35-49 - Luca Cardelli:

Abstractions for Mobile Computation. 51-94 - Matthew Hennessy, James Riely

:
Type-Safe Execution of Mobile Agents in Anonymous Networks. 95-115 - Rocco De Nicola

, Gian-Luigi Ferrari
, Rosario Pugliese:
Types as Specifications of Access Policies. 118-146 - Xavier Leroy, François Rouaix:

Security Properties of Typed Applets. 147-182
Concepts
- Matt Blaze, Joan Feigenbaum, Angelos D. Keromytis:

The Role of Trust Management in Distributed Systems Security. 185-210 - Tuomas Aura:

Distributed Access-Rights Managements with Delegations Certificates. 211-235 - Gerald Brose:

A View-Based Access Control Model for CORBA. 237-252 - Christian F. Tschudin:

Apoptosis - the Programmed Death of Distributed Services. 253-260 - Bennet S. Yee:

A Sanctuary for Mobile Agents. 261-273 - Volker Roth:

Mutual Protection of Co-operating Agents. 275-285
Implementations
- Trent Jaeger:

Access Control in Configurable Systems. 289-316 - Robert Grimm, Brian N. Bershad:

Providing Policy-Neutral and Transparent Access Control in Extensible Systems. 317-338 - Michael B. Jones:

Interposition Agents: Transparently Interposing User Code at the System Interface. 339-368 - Thorsten von Eicken, Chi-Chao Chang, Grzegorz Czajkowski, Chris Hawblitzel, Deyu Hu, Dan Spoonhower:

J-Kernel: A Capability-Based Operating System for Java. 369-393 - Leendert van Doorn, Martín Abadi, Michael Burrows, Edward Wobber:

Secure Network Objects. 395-412 - Guy Edjlali, Anurag Acharya, Vipin Chaudhary

:
History-Based Access Control for Mobile Code. 413-431 - D. Scott Alexander, William A. Arbaugh, Angelos D. Keromytis, Jonathan M. Smith:

Security in Active Networks. 433-451 - Jarle Hulaas, Alex Villazón

, Jürgen Harms:
Using Interfaces to Specify Access Rights. 453-468 - Uwe G. Wilhelm, Sebastian Staamann, Levente Buttyán:

Introducing Trusted Third Parties to the Mobile Agent Paradigm. 469-489

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














