Secure Internet Programming Security Issues for Mobile and Distributed Objects /

Large-scale open distributed systems provide an infrastructure for assembling global applications on the basis of software and hardware components originating from multiple sources. Open systems rely on publicly available standards to permit heterogeneous components to interact. The Internet is the...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Vitek, Jan (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Jensen, Christian D. (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 1999.
Έκδοση:1st ed. 1999.
Σειρά:Lecture Notes in Computer Science, 1603
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Foundations
  • Trust: Benefits, Models, and Mechanisms
  • Protection in Programming-Language Translations
  • Reflective Authorization Systems: Possibilities, Benefits, and Drawbacks
  • Abstractions for Mobile Computation
  • Type-Safe Execution of Mobile Agents in Anonymous Networks
  • Types as Specifications of Access Policies
  • Security Properties of Typed Applets
  • Concepts
  • The Role of Trust Management in Distributed Systems Security
  • Distributed Access-Rights Management with Delegation Certificates
  • A View-Based Access Control Model for CORBA
  • Apoptosis - the Programmed Death of Distributed Services
  • A Sanctuary for Mobile Agents
  • Mutual Protection of Co-operating Agents
  • Implementations
  • Access Control in Configurable Systems
  • Providing Policy-Neutral and Transparent Access Control in Extensible Systems
  • Interposition Agents: Transparently Interposing User Code at the System Interface
  • J-Kernel: A Capability-Based Operating System for Java
  • Secure Network Objects
  • History-Based Access Control for Mobile Code
  • Security in Active Networks
  • Using Interfaces to Specify Access Rights
  • Introducing Trusted Third Parties to the Mobile Agent Paradigm.