Vitek / Jensen | Secure Internet Programming | E-Book | sack.de
E-Book

E-Book, Englisch, Band 1603, 506 Seiten, eBook

Reihe: Lecture Notes in Computer Science

Vitek / Jensen Secure Internet Programming

Security Issues for Mobile and Distributed Objects
Erscheinungsjahr 2007
ISBN: 978-3-540-48749-4
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark

Security Issues for Mobile and Distributed Objects

E-Book, Englisch, Band 1603, 506 Seiten, eBook

Reihe: Lecture Notes in Computer Science

ISBN: 978-3-540-48749-4
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark



Large-scale open distributed systems provide an infrastructure for assembling global applications on the basis of software and hardware components originating from multiple sources. Open systems rely on publicly available standards to permit heterogeneous components to interact. The Internet is the archetype of a large-scale open distributed system; standards such as HTTP, HTML, and XML, together with the widespread adoption of the Java language, are the cornerstones of many distributed systems. This book surveys security in large-scale open distributed systems by presenting several classic papers and a variety of carefully reviewed contributions giving the results of new research and development. Part I provides background requirements and deals with fundamental issues in trust, programming, and mobile computations in large-scale open distributed systems. Part II contains descriptions of general concepts, and Part III presents papers detailing implementations of security concepts.
Vitek / Jensen Secure Internet Programming jetzt bestellen!

Zielgruppe


Professional/practitioner

Weitere Infos & Material


Foundations.- Trust: Benefits, Models, and Mechanisms.- Protection in Programming-Language Translations.- Reflective Authorization Systems: Possibilities, Benefits, and Drawbacks.- Abstractions for Mobile Computation.- Type-Safe Execution of Mobile Agents in Anonymous Networks.- Types as Specifications of Access Policies.- Security Properties of Typed Applets.- Concepts.- The Role of Trust Management in Distributed Systems Security.- Distributed Access-Rights Management with Delegation Certificates.- A View-Based Access Control Model for CORBA.- Apoptosis — the Programmed Death of Distributed Services.- A Sanctuary for Mobile Agents.- Mutual Protection of Co-operating Agents.- Implementations.- Access Control in Configurable Systems.- Providing Policy-Neutral and Transparent Access Control in Extensible Systems.- Interposition Agents: Transparently Interposing User Code at the System Interface.- J-Kernel: A Capability-Based Operating System for Java.- Secure Network Objects.- History-Based Access Control for Mobile Code.- Security in Active Networks.- Using Interfaces to Specify Access Rights.- Introducing Trusted Third Parties to the Mobile Agent Paradigm.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.