Secure internet programming : security issues for mobile and distributed objects
Author(s)
Bibliographic Information
Secure internet programming : security issues for mobile and distributed objects
(Lecture notes in computer science, 1603)
Springer, c1999
Available at 34 libraries
  Aomori
  Iwate
  Miyagi
  Akita
  Yamagata
  Fukushima
  Ibaraki
  Tochigi
  Gunma
  Saitama
  Chiba
  Tokyo
  Kanagawa
  Niigata
  Toyama
  Ishikawa
  Fukui
  Yamanashi
  Nagano
  Gifu
  Shizuoka
  Aichi
  Mie
  Shiga
  Kyoto
  Osaka
  Hyogo
  Nara
  Wakayama
  Tottori
  Shimane
  Okayama
  Hiroshima
  Yamaguchi
  Tokushima
  Kagawa
  Ehime
  Kochi
  Fukuoka
  Saga
  Nagasaki
  Kumamoto
  Oita
  Miyazaki
  Kagoshima
  Okinawa
  Korea
  China
  Thailand
  United Kingdom
  Germany
  Switzerland
  France
  Belgium
  Netherlands
  Sweden
  Norway
  United States of America
-
Library, Research Institute for Mathematical Sciences, Kyoto University数研
L/N||LNCS||160399024958
Note
Includes bibliographical references and index
Description and Table of Contents
Description
Large-scale open distributed systems provide an infrastructure for assembling global applications on the basis of software and hardware components originating from multiple sources. Open systems rely on publicly available standards to permit heterogeneous components to interact. The Internet is the archetype of a large-scale open distributed system; standards such as HTTP, HTML, and XML, together with the widespread adoption of the Java language, are the cornerstones of many distributed systems. This book surveys security in large-scale open distributed systems by presenting several classic papers and a variety of carefully reviewed contributions giving the results of new research and development. Part I provides background requirements and deals with fundamental issues in trust, programming, and mobile computations in large-scale open distributed systems. Part II contains descriptions of general concepts, and Part III presents papers detailing implementations of security concepts.
Table of Contents
Foundations.- Trust: Benefits, Models, and Mechanisms.- Protection in Programming-Language Translations.- Reflective Authorization Systems: Possibilities, Benefits, and Drawbacks.- Abstractions for Mobile Computation.- Type-Safe Execution of Mobile Agents in Anonymous Networks.- Types as Specifications of Access Policies.- Security Properties of Typed Applets.- Concepts.- The Role of Trust Management in Distributed Systems Security.- Distributed Access-Rights Management with Delegation Certificates.- A View-Based Access Control Model for CORBA.- Apoptosis - the Programmed Death of Distributed Services.- A Sanctuary for Mobile Agents.- Mutual Protection of Co-operating Agents.- Implementations.- Access Control in Configurable Systems.- Providing Policy-Neutral and Transparent Access Control in Extensible Systems.- Interposition Agents: Transparently Interposing User Code at the System Interface.- J-Kernel: A Capability-Based Operating System for Java.- Secure Network Objects.- History-Based Access Control for Mobile Code.- Security in Active Networks.- Using Interfaces to Specify Access Rights.- Introducing Trusted Third Parties to the Mobile Agent Paradigm.
by "Nielsen BookData"