Secure Internet Programming: Security Issues for Mobile and Distributed Objects

Foundations.- Trust: Benefits, Models, and Mechanisms.- Protection in Programming-Language Translations.- Reflective Authorization Systems: Possibilities, Benefits, and Drawbacks.- Abstractions for Mobile Computation.- Type-Safe Execution of Mobile Agents in Anonymous Networks.- Types as Specifications of Access Policies.- Security Properties of Typed Applets.- Concepts.- The Role of Trust Management in Distributed Systems Security.- Distributed Access-Rights Management with Delegation Certificates.- A View-Based Access Control Model for CORBA.- Apoptosis - the Programmed Death of Distributed Services.- A Sanctuary for Mobile Agents.- Mutual Protection of Co-operating Agents.- Implementations.- Access Control in Configurable Systems.- Providing Policy-Neutral and Transparent Access Control in Extensible Systems.- Interposition Agents: Transparently Interposing User Code at the System Interface.- J-Kernel: A Capability-Based Operating System for Java.- Secure Network Objects.- History-Based Access Control for Mobile Code.- Security in Active Networks.- Using Interfaces to Specify Access Rights.- Introducing Trusted Third Parties to the Mobile Agent Paradigm.