Secure Internet Programming: Security Issues for Mobile and Distributed Objects, Issue 1603 (Google eBook)

Front Cover
Jan Vitek, Christian D. Jensen
Springer Science & Business Media, Jun 2, 1999 - Business & Economics - 501 pages
0 Reviews
Large-scale open distributed systems provide an infrastructure for assembling global applications on the basis of software and hardware components originating from multiple sources. Open systems rely on publicly available standards to permit heterogeneous components to interact. The Internet is the archetype of a large-scale open distributed system; standards such as HTTP, HTML, and XML, together with the widespread adoption of the Java language, are the cornerstones of many distributed systems. This book surveys security in large-scale open distributed systems by presenting several classic papers and a variety of carefully reviewed contributions giving the results of new research and development. Part I provides background requirements and deals with fundamental issues in trust, programming, and mobile computations in large-scale open distributed systems. Part II contains descriptions of general concepts, and Part III presents papers detailing implementations of security concepts.
  

What people are saying - Write a review

We haven't found any reviews in the usual places.

Selected pages

Contents

Benefits Models and Mechanisms
3
Protection in ProgrammingLanguage Translations
19
Possibilities Benefits and Drawbacks
35
Abstractions for Mobile Computation
51
TypeSafe Execution of Mobile Agents in Anonymous Networks
95
Types as Specifications of Access Policies
117
Security Properties of Typed Applets
147
The Role of Trust Management in Distributed Systems Security
185
Mutual Protection of Cooperating Agents
275
Access Control in Configurable Systems
289
Providing PolicyNeutral and Transparent Access Control in Extensible Systems
317
Transparently Interposing User Code at the System Interface
339
A CapabilityBased Operating System for Java
369
Secure Network Objects
395
HistoryBased Access Control for Mobile Code
413
Security in Active Networks
433

Distributed AccessRights Management with Delegation Certificates
211
A ViewBased Access Control Model for CORBA
237
Apoptosis the Programmed Death of Distributed Services
253
A Sanctuary for Mobile Agents
261
Using Interfaces to Specify Access Rights
453
Introducing Trusted Third Parties to the Mobile Agent Paradigm
469
List of Authors Feb 1999
493
Copyright

Common terms and phrases

Popular passages

Page 6 - agents cooperate when they engage in a joint venture for the outcome of which the actions of each are necessary, and where a necessary action by at least one of them is not under the immediate control of the other".

References to this book