rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9783540661306

Secure Internet Programming : Security Issues for Mobile and Distributed Objects

by ;
  • ISBN13:

    9783540661306

  • ISBN10:

    3540661301

  • Format: Paperback
  • Copyright: 1999-07-01
  • Publisher: Springer Verlag
  • Purchase Benefits
List Price: $139.00 Save up to $119.20
  • Digital
    $42.90*
    Add to Cart

    DURATION
    PRICE
    *To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.

Summary

Large-scale open distributed systems provide an infrastructure for assembling global applications on the basis of software and hardware components originating from multiple sources. Open systems rely on publicly available standards to permit heterogeneous components to interact. The Internet is the archetype of a large-scale open distributed system; standards such as HTTP, HTML, and XML, together with the widespread adoption of the Java language, are the cornerstones of many distributed systems. This book surveys security in large-scale open distributed systems by presenting several classic papers and a variety of carefully reviewed contributions giving the results of new research and development. Part I provides background requirements and deals with fundamental issues in trust, programming, and mobile computations in large-scale open distributed systems. Part II contains descriptions of general concepts, and Part III presents papers detailing implementations of security concepts.

Table of Contents

I Foundations
Trust: Benefits, Models, and Mechanisms
3(16)
Vipin Swarup
Javier Thayer Fabrega
Protection in Programming--Language Translations
19(16)
Martin Abadi
Reflective Authorization Systems: Possibilities, Benefits, and Draw--backs
35(16)
Massimo Ancona
Walter Cazzola
Eduardo B. Fernandez
Abstractions for Mobile Computations
51(44)
Luca Cardelli
Type-Safe Execution of Mobile Agents in Anonymous Networks
95(22)
Matthew Hennessey
James Riely
Types as Specifications of Access Policies
117(30)
Rocco De Nicola
GianLuigi Ferrari
Rosario Pugliese
Security Properties of Typed Applets
147(38)
Xavier Leroy
Francois Rouaix
II Concepts
The Role of Trust Management in Distributed Systems Security
185(26)
Matt Blaze Joan Feigenbaum
John Ioannidis
Angelos D. Keromytis
Distributed Access--Rights Management with Delegation Certificates
211(26)
Tuomas Aura
A View-Based Access Control Model for CORBA
237(16)
Gerald Brose
Apoptosis --- the Programmed Death of Distributed Services
253(8)
Christian Tschudin
A Sanctuary for Mobile Agents
261(14)
Bennet S. Yee
Mutual Protection of Co-operating Agents
275(14)
Volker Roth
III Implementations
Access Control in Configurable Systems
289(28)
Trent Jaeger
Providing Policy--Neutral and Transparent Access Control in Extensible Systems
317(22)
Robert Grimm
Brian N. Bershad
Interposition Agents: Transparently Interposing User Code at the System Interface
339(30)
Michael B. Jones
J--Kernel: A Capability-Based Operating System for Java
369(26)
Thorsten von Eicken
Chi--Chao Chang
Grzegorz Czajkowski
Chris Hawblitzel
Deyu Hu
Dan Spoonhower
Secure Network Objects
395(18)
Leendert van Doorn
Martin Abadi
Mike Burrows
Edward Wobber
History--Based Access Control for Mobile Code
413(20)
Guy Edjlali
Anurag Acharya
Vipin Chaudhary
Security in Active Networks
433(20)
D. Scott Alexander
William A. Arbaugh
Angelos D. Keromytis
Jonathan M. Smith
Using Interfaces to Specify Access Rights
453(16)
J. Hulaas
A. Villazon
J. Harms
Introducing Trusted Third Parties tothe Mobile Agent Paradigm
469(24)
Uwe G. Wilhelm
Sebastian Staamann
Levente Buttyan
IV Appendix
List of Authors 493

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program