<span>Large-scale open distributed systems provide an infrastructure for assembling global applications on the basis of software and hardware components originating from multiple sources. Open systems rely on publicly available standards to permit heterogeneous components to interact. The Internet i
Secure Internet Programming: Security Issues for Mobile and Distributed Objects
β Scribed by Vipin Swarup, Javier Thayer FΓ‘brega (auth.), Jan Vitek, Christian D. Jensen (eds.)
- Publisher
- Springer-Verlag Berlin Heidelberg
- Year
- 1999
- Tongue
- English
- Leaves
- 496
- Series
- Lecture Notes in Computer Science 1603
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Large-scale open distributed systems provide an infrastructure for assembling global applications on the basis of software and hardware components originating from multiple sources. Open systems rely on publicly available standards to permit heterogeneous components to interact. The Internet is the archetype of a large-scale open distributed system; standards such as HTTP, HTML, and XML, together with the widespread adoption of the Java language, are the cornerstones of many distributed systems. This book surveys security in large-scale open distributed systems by presenting several classic papers and a variety of carefully reviewed contributions giving the results of new research and development. Part I provides background requirements and deals with fundamental issues in trust, programming, and mobile computations in large-scale open distributed systems. Part II contains descriptions of general concepts, and Part III presents papers detailing implementations of security concepts.
β¦ Table of Contents
Front Matter....Pages 1-1
Trust: Benefits, Models, and Mechanisms....Pages 3-18
Protection in Programming-Language Translations....Pages 19-34
Reflective Authorization Systems: Possibilities, Benefits, and Drawbacks....Pages 35-49
Abstractions for Mobile Computation....Pages 51-94
Type-Safe Execution of Mobile Agents in Anonymous Networks....Pages 95-115
Types as Specifications of Access Policies....Pages 117-146
Security Properties of Typed Applets....Pages 147-182
Front Matter....Pages 183-183
The Role of Trust Management in Distributed Systems Security....Pages 185-210
Distributed Access-Rights Management with Delegation Certificates....Pages 211-235
A View-Based Access Control Model for CORBA....Pages 237-252
Apoptosis β the Programmed Death of Distributed Services....Pages 253-260
A Sanctuary for Mobile Agents....Pages 261-273
Mutual Protection of Co-operating Agents....Pages 275-285
Front Matter....Pages 287-287
Access Control in Configurable Systems....Pages 289-316
Providing Policy-Neutral and Transparent Access Control in Extensible Systems....Pages 317-338
Interposition Agents: Transparently Interposing User Code at the System Interface....Pages 339-368
J-Kernel: A Capability-Based Operating System for Java....Pages 369-393
Secure Network Objects....Pages 395-412
History-Based Access Control for Mobile Code....Pages 413-431
Security in Active Networks....Pages 433-451
Front Matter....Pages 287-287
Using Interfaces to Specify Access Rights....Pages 453-468
Introducing Trusted Third Parties to the Mobile Agent Paradigm....Pages 469-489
β¦ Subjects
Computer Communication Networks; Data Encryption; Software Engineering; Business Information Systems
π SIMILAR VOLUMES
The scope of this second edition of the introduction to fundamental distributed programming abstractions has been extended to cover βByzantine fault toleranceβ. It includes algorithms to implement these abstractions in vulnerable distributed systems.Β
<p><p>In modern computing a program is usually distributed among several processes. The fundamental challenge when developing reliable and secure distributed programs is to support the cooperation of processes required to execute a common task, even when some of these processes fail. Failures may ra
<p><p>In modern computing a program is usually distributed among several processes. The fundamental challenge when developing reliable and secure distributed programs is to support the cooperation of processes required to execute a common task, even when some of these processes fail. Failures may ra
Despite recent dramatic advances in computer security regarding the proliferation of services and applications, security threats are still major impediments in the deployment of these services. Paying serious attention to these issues, Security in Distributed, Grid, Mobile, and Pervasive Computing f
Despite recent dramatic advances in computer security regarding the proliferation of services and applications, security threats are still major impediments in the deployment of these services. Paying serious attention to these issues, Security in Distributed, Grid, Mobile, and Pervasive Computing f