𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Secure Internet Programming: Security Issues for Mobile and Distributed Objects

✍ Scribed by Vipin Swarup, Javier Thayer FÑbrega (auth.), Jan Vitek, Christian D. Jensen (eds.)


Publisher
Springer-Verlag Berlin Heidelberg
Year
1999
Tongue
English
Leaves
496
Series
Lecture Notes in Computer Science 1603
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Large-scale open distributed systems provide an infrastructure for assembling global applications on the basis of software and hardware components originating from multiple sources. Open systems rely on publicly available standards to permit heterogeneous components to interact. The Internet is the archetype of a large-scale open distributed system; standards such as HTTP, HTML, and XML, together with the widespread adoption of the Java language, are the cornerstones of many distributed systems. This book surveys security in large-scale open distributed systems by presenting several classic papers and a variety of carefully reviewed contributions giving the results of new research and development. Part I provides background requirements and deals with fundamental issues in trust, programming, and mobile computations in large-scale open distributed systems. Part II contains descriptions of general concepts, and Part III presents papers detailing implementations of security concepts.

✦ Table of Contents


Front Matter....Pages 1-1
Trust: Benefits, Models, and Mechanisms....Pages 3-18
Protection in Programming-Language Translations....Pages 19-34
Reflective Authorization Systems: Possibilities, Benefits, and Drawbacks....Pages 35-49
Abstractions for Mobile Computation....Pages 51-94
Type-Safe Execution of Mobile Agents in Anonymous Networks....Pages 95-115
Types as Specifications of Access Policies....Pages 117-146
Security Properties of Typed Applets....Pages 147-182
Front Matter....Pages 183-183
The Role of Trust Management in Distributed Systems Security....Pages 185-210
Distributed Access-Rights Management with Delegation Certificates....Pages 211-235
A View-Based Access Control Model for CORBA....Pages 237-252
Apoptosis β€” the Programmed Death of Distributed Services....Pages 253-260
A Sanctuary for Mobile Agents....Pages 261-273
Mutual Protection of Co-operating Agents....Pages 275-285
Front Matter....Pages 287-287
Access Control in Configurable Systems....Pages 289-316
Providing Policy-Neutral and Transparent Access Control in Extensible Systems....Pages 317-338
Interposition Agents: Transparently Interposing User Code at the System Interface....Pages 339-368
J-Kernel: A Capability-Based Operating System for Java....Pages 369-393
Secure Network Objects....Pages 395-412
History-Based Access Control for Mobile Code....Pages 413-431
Security in Active Networks....Pages 433-451
Front Matter....Pages 287-287
Using Interfaces to Specify Access Rights....Pages 453-468
Introducing Trusted Third Parties to the Mobile Agent Paradigm....Pages 469-489

✦ Subjects


Computer Communication Networks; Data Encryption; Software Engineering; Business Information Systems


πŸ“œ SIMILAR VOLUMES


Secure Internet Programming: Security Is
✍ Jan Vitek (editor), Christian D. Jensen (editor) πŸ“‚ Library πŸ“… 1999 πŸ› Springer 🌐 English

<span>Large-scale open distributed systems provide an infrastructure for assembling global applications on the basis of software and hardware components originating from multiple sources. Open systems rely on publicly available standards to permit heterogeneous components to interact. The Internet i

Reliable and Secure Distributed Programm
✍ Christian Cachin, Rachid Guerraoui, Luis Rodrigues πŸ“‚ Library πŸ“… 2011 πŸ› Springer 🌐 English

The scope of this second edition of the introduction to fundamental distributed programming abstractions has been extended to cover β€˜Byzantine fault tolerance’. It includes algorithms to implement these abstractions in vulnerable distributed systems.Β 

Introduction to Reliable and Secure Dist
✍ Christian Cachin, Rachid Guerraoui, LuΓ­s Rodrigues (auth.) πŸ“‚ Library πŸ“… 2011 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p><p>In modern computing a program is usually distributed among several processes. The fundamental challenge when developing reliable and secure distributed programs is to support the cooperation of processes required to execute a common task, even when some of these processes fail. Failures may ra

Introduction to Reliable and Secure Dist
✍ Christian Cachin, Rachid Guerraoui, LuΓ­s Rodrigues (auth.) πŸ“‚ Library πŸ“… 2011 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p><p>In modern computing a program is usually distributed among several processes. The fundamental challenge when developing reliable and secure distributed programs is to support the cooperation of processes required to execute a common task, even when some of these processes fail. Failures may ra

Security in Distributed, Grid, Mobile, a
✍ Yang Xiao πŸ“‚ Library πŸ“… 2007 πŸ› Auerbach Publications 🌐 English

Despite recent dramatic advances in computer security regarding the proliferation of services and applications, security threats are still major impediments in the deployment of these services. Paying serious attention to these issues, Security in Distributed, Grid, Mobile, and Pervasive Computing f

Security in Distributed, Grid, Mobile, a
✍ Yang Xiao πŸ“‚ Library πŸ“… 2007 πŸ› Auerbach Publications 🌐 English

Despite recent dramatic advances in computer security regarding the proliferation of services and applications, security threats are still major impediments in the deployment of these services. Paying serious attention to these issues, Security in Distributed, Grid, Mobile, and Pervasive Computing f