000 04105nam a22005415i 4500
001 978-3-540-48749-4
003 DE-He213
005 20160624102037.0
007 cr nn 008mamaa
008 121227s1999 gw | s |||| 0|eng d
020 _a9783540487494
_9978-3-540-48749-4
024 7 _a10.1007/3-540-48749-2
_2doi
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM075000
_2bisacsh
082 0 4 _a004.6
_223
245 1 0 _aSecure Internet Programming
_h[electronic resource] :
_bSecurity Issues for Mobile and Distributed Objects /
_cedited by Jan Vitek, Christian D. Jensen.
260 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c1999.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c1999.
300 _aX, 506 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v1603
505 0 _aFoundations -- Trust: Benefits, Models, and Mechanisms -- Protection in Programming-Language Translations -- Reflective Authorization Systems: Possibilities, Benefits, and Drawbacks -- Abstractions for Mobile Computation -- Type-Safe Execution of Mobile Agents in Anonymous Networks -- Types as Specifications of Access Policies -- Security Properties of Typed Applets -- Concepts -- The Role of Trust Management in Distributed Systems Security -- Distributed Access-Rights Management with Delegation Certificates -- A View-Based Access Control Model for CORBA -- Apoptosis — the Programmed Death of Distributed Services -- A Sanctuary for Mobile Agents -- Mutual Protection of Co-operating Agents -- Implementations -- Access Control in Configurable Systems -- Providing Policy-Neutral and Transparent Access Control in Extensible Systems -- Interposition Agents: Transparently Interposing User Code at the System Interface -- J-Kernel: A Capability-Based Operating System for Java -- Secure Network Objects -- History-Based Access Control for Mobile Code -- Security in Active Networks -- Using Interfaces to Specify Access Rights -- Introducing Trusted Third Parties to the Mobile Agent Paradigm.
520 _aLarge-scale open distributed systems provide an infrastructure for assembling global applications on the basis of software and hardware components originating from multiple sources. Open systems rely on publicly available standards to permit heterogeneous components to interact. The Internet is the archetype of a large-scale open distributed system; standards such as HTTP, HTML, and XML, together with the widespread adoption of the Java language, are the cornerstones of many distributed systems. This book surveys security in large-scale open distributed systems by presenting several classic papers and a variety of carefully reviewed contributions giving the results of new research and development. Part I provides background requirements and deals with fundamental issues in trust, programming, and mobile computations in large-scale open distributed systems. Part II contains descriptions of general concepts, and Part III presents papers detailing implementations of security concepts.
650 0 _aComputer science.
650 0 _aComputer Communication Networks.
650 0 _aSoftware engineering.
650 0 _aData encryption (Computer science).
650 0 _aManagement information systems.
650 1 4 _aComputer Science.
650 2 4 _aComputer Communication Networks.
650 2 4 _aData Encryption.
650 2 4 _aSoftware Engineering.
650 2 4 _aBusiness Information Systems.
700 1 _aVitek, Jan.
_eeditor.
700 1 _aJensen, Christian D.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783540661306
786 _dSpringer
830 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v1603
856 4 0 _uhttp://dx.doi.org/10.1007/3-540-48749-2
942 _2EBK6560
_cEBK
999 _c35854
_d35854