ISBN: 3-540-66130-1
TITLE: Secure Internet Programming
AUTHOR: Vitek, Jan; Jensen, Christian D. (Eds.)
TOC:

I Foundations
Trust: Benefits, Models, and Mechanism (Vipin Swarup and Javier Thayer Fbrega) 3
Protection in ProgrammingLanguage Translations (Martn Abadi) 19
Reflective Authorization Systems: Possibilities, Benefits, and Drawbacks (Massimo Ancona, Walter Cazzola, and Eduardo B. Fernandez) 35
Abstractions for Mobile Computations (Luca Cardelli) 51
TypeSafe Execution of Mobile Agents in Anonymous Networks (Matthew Hennessey and James Riely) 95
Types as Specifications of Access Policies (Rocco De Nicola, GianLuigi Ferrari, and Rosario Pugliese) 117
Security Properties of Typed Applets (Xavier Leroy and Franois Rouaix) 147
II Concepts
The Role of Trust Management in Distributed Systems Security (Matt Blaze, Joan Feigenbaum, John Ioannidis, and Angelos D. Keromytis) 185
Distributed AccessRights Management with Delegation Certicates (Tuomas Aura) 211
A ViewBased Access Control Model for CORBA (Gerald Brose) 237
Apoptosis - the Programmed Death of Distributed Services (Christian Tschudin) 253
A Sanctuary for Mobile Agents (Bennet S. Yee) 261
Mutual Protection of Cooperating Agents (Volker Roth) 275
III Implementations
Access Control in Configurable Systems (Trent Jaeger) 289
Providing PolicyNeutral and Transparent Access Control in Extensible Systems (Robert Grimm and Brian N. Bershad) 317
Interposition Agents: Transparently Interposing User Code at the System Interface (Michael B. Jones) 339
JKernel: A CapabilityBased Operating System for Java (Thorsten von Eicken, ChiChao Chang, Grzegorz Czajkowski, Chris Hawblitzel, Deyu Hu, and Dan Spoonhower) 369
Secure Network Objects (Leendert van Doorn, Martn Abadi, Mike Burrows, and Edward Wobber) 395
HistoryBased Access Control for Mobile Code (Guy Edjlali, Anurag Acharya, and Vipin Chaudhary) 413
Security in Active Networks (D. Scott Alexander, William A. Arbaugh, Angelos D. Keromytis, and Jonathan M. Smith) 433
Using Interfaces to Specify Access Rights (J. Hulaas, A. Villazn, and J. Harms) 453
Introducing Trusted Third Parties to the Mobile Agent Paradigm (Uwe G. Wilhelm, Sebastian Staamann, and Levente Buttyn) 469
IV Appendix
List of Authors 493
END
