Secure Internet Programming 1999
Jan Vitek, Christian Damsgaard Jensen (Eds.):
Secure Internet Programming, Security Issues for Mobile and Distributed Objects.
Lecture Notes in Computer Science 1603 Springer 1999, ISBN 3-540-66130-1 BibTeX
The idea for this book arose from a number of discussions and presentations given at two ECOOP'98 workshops:
the Workshop on Distributed Object Security and the Workshop on Mobility:
Secure Internet Mobile Computation.
Foundations
- Vipin Swarup, F. Javier Thayer:
Trust: Benefits, Models, and Mechanisms.
3-18 BibTeX
- Martín Abadi:
Protection in Programming-Language Translations.
19-34 BibTeX
- Massimo Ancona, Walter Cazzola, Eduardo B. Fernández:
Reflective Authorization Systems: Possibilities, Benefits, and Drawbacks.
35-49 BibTeX
- Luca Cardelli:
Abstractions for Mobile Computation.
51-94 BibTeX
- Matthew Hennessy, James Riely:
Type-Safe Execution of Mobile Agents in Anonymous Networks.
95-115 BibTeX
- Rocco De Nicola, Gian Luigi Ferrari, Rosario Pugliese:
Types as Specifications of Access Policies.
118-146 BibTeX
- Xavier Leroy, François Rouaix:
Security Properties of Typed Applets.
147-182 BibTeX
Concepts
Implementations
- Trent Jaeger:
Access Control in Configurable Systems.
289-316 BibTeX
- Robert Grimm, Brian N. Bershad:
Providing Policy-Neutral and Transparent Access Control in Extensible Systems.
317-338 BibTeX
- Michael B. Jones:
Interposition Agents: Transparently Interposing User Code at the System Interface.
339-368 BibTeX
- Thorsten von Eicken, Chi-Chao Chang, Grzegorz Czajkowski, Chris Hawblitzel, Deyu Hu, Dan Spoonhower:
J-Kernel: A Capability-Based Operating System for Java.
369-393 BibTeX
- Leendert van Doorn, Martín Abadi, Michael Burrows, Edward Wobber:
Secure Network Objects.
395-412 BibTeX
- Guy Edjlali, Anurag Acharya, Vipin Chaudhary:
History-Based Access Control for Mobile Code.
413-431 BibTeX
- D. Scott Alexander, William A. Arbaugh, Angelos D. Keromytis, Jonathan M. Smith:
Security in Active Networks.
433-451 BibTeX
- Jarle Hulaas, Alex Villazón, Jürgen Harms:
Using Interfaces to Specify Access Rights.
453-468 BibTeX
- Uwe G. Wilhelm, Sebastian Staamann, Levente Buttyán:
Introducing Trusted Third Parties to the Mobile Agent Paradigm.
469-489 BibTeX
Copyright © Sat May 16 23:08:19 2009
by Michael Ley (ley@uni-trier.de)