The Simple Public-Key GSS-API Mechanism (SPKM), 1996. ,
DOI : 10.17487/rfc2025
The Challenges of CORBA Security, Workshop Sicherheit in Mediendaten, Gesellschaft für Informatik (GI), pp.61-72, 2000. ,
DOI : 10.1007/978-3-642-58346-9_6
Hierarchical and Declarative Security for Grid Applications, Proceedings of the International Conference On High Performance Computing, 2003. ,
DOI : 10.1007/978-3-540-24596-4_39
Une architecture de sécurité déclarative et hiérarchique pour les grilles de calcul, INRIA, editor, 2ème rencontre francophone sur le thème Sécurité et Architecture Réseau, pp.203-212, 2003. ,
Deployment-Based Security for Grid Applications, The International Conference on Computational Science (ICCS 2005), 2005. ,
DOI : 10.1007/11428831_65
Object-Oriented SPMD with Active Object, Proceedings of Cluster Computing and Grid, 2005. ,
A Formal Analysis of the CORBA Security Service, ZB 2002 : Formal Specification and Development in Z and B, pp.330-349, 2002. ,
DOI : 10.1007/3-540-45648-1_17
Interactive and descriptor-based deployment of object-oriented grid applications, Proceedings 11th IEEE International Symposium on High Performance Distributed Computing, pp.93-102, 2002. ,
DOI : 10.1109/HPDC.2002.1029907
A Hybrid Message Logging-CIC Protocol for Constrained Checkpointability, Proceedings of EuroPar2005, 2005. ,
DOI : 10.1007/11549468_71
From Distributed Objects to Hierarchical Grid Components, International Symposium on Distributed Objects and Applications (DOA), 2003. ,
DOI : 10.1007/978-3-540-39964-3_78
Secure computer system : Unified exposition and multics interpretation, 1976. ,
The design and implementation of distributed Smalltalk, ACM SIGPLAN Notices, vol.22, issue.12, pp.318-330, 1987. ,
DOI : 10.1145/38807.38836
Differential cryptanalysis mod 2 32 with applications to MD5, Advances in Cryptology ? Eurocrypt '92, 1992. ,
Integrity consideration for secure computer systems, 1975. ,
Differential cryptanalysis of DES-like cryptosystems, Proceedings of CRYPTO 90, pp.2-21, 1991. ,
Object Technology Series, 1999. ,
Objets pour la programmation parallèle et répartie : intérêts, évolutions et tendances, Technique et Science Informatiques (TSI), vol.15, issue.6, pp.765-800, 1996. ,
Recursive and Dynamic Software Composition with Sharing, Proceedings of the Seventh International Workshop on Component-Oriented Programming at ECOOP, 2002. ,
Proxy-based security protocols in networked mobile devices, Proceedings of the 2002 ACM symposium on Applied computing , SAC '02, pp.265-272, 2002. ,
DOI : 10.1145/508791.508845
A case study of the ejb security : Combining declarative, role-based access control with programmatic application-specific proxy security checks, PDPTA '02 : Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, pp.1344-1347, 2002. ,
Mobile agents: Are they a good idea?, IBM, Yorktown Heights, 1994. ,
DOI : 10.1007/3-540-62852-5_4
A Comparison of Commercial and Military Computer Security Policies, 1987 IEEE Symposium on Security and Privacy, pp.184-194, 1987. ,
DOI : 10.1109/SP.1987.10001
Protection in the Hydra Operating System, ACM SIGOPS Operating Systems Review, vol.9, issue.5, pp.141-160, 1975. ,
DOI : 10.1145/1067629.806532
Tunnel agents for enhanced Internet QoS, IEEE Concurrency, vol.6, issue.2, pp.30-39, 1998. ,
DOI : 10.1109/4434.678787
A New Elliptic Curve Based Analogue of RSA, Lecture Notes in Computer Science, vol.765, pp.40-49, 1994. ,
DOI : 10.1007/3-540-48285-7_4
Integrating security in CORBA based object architectures, Proceedings 1995 IEEE Symposium on Security and Privacy, pp.50-61, 1995. ,
DOI : 10.1109/SECPRI.1995.398922
Modèle et infrastructure de programmation pair-à-pair. Master's thesis, 2004. ,
New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.22644-654, 1976. ,
DOI : 10.1109/TIT.1976.1055638
An Introduction to Formal Methods, 1994. ,
Cryptanalysis of MD4, Fast Software Encryption Workshop, pp.53-69, 1996. ,
DOI : 10.1007/3-540-60865-6_43
SPKI Requirements, RFC 2692, IETF, 1999. ,
DOI : 10.17487/rfc2692
SPKI Certificate Theory, RFC 2693, 1999. ,
DOI : 10.17487/rfc2693
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.189.1209
Extending jini with decentralized trust management, 3rd IEEE Conference on Open Architectures and Network Programming, pp.25-29, 2000. ,
Security for mobile agents: Authentication and state appraisal, Computer Security-ESORICS 96. 4th European Symposium on Research in Computer Security Proceedings, number 1146 in Lecture Notes in Computer Science, pp.118-130, 1996. ,
DOI : 10.1007/3-540-61770-1_31
Security for mobile agents : Issues and requirements, Proceedings of the 19th National Information Systems Security Conference, pp.591-597, 1996. ,
Role based access control, 15th National Computer Security Conference, pp.554-563, 1992. ,
A flexible security system for metacomputing environments, 1998. ,
DOI : 10.1007/BFb0100598
A flexible security system for metacomputing environments, HPCN Europe, pp.370-380, 1999. ,
DOI : 10.1007/BFb0100598
Aggregation and Separation as Noninterference Properties, Journal of Computer Security, vol.1, issue.2, pp.159-188, 1992. ,
DOI : 10.3233/JCS-1992-1203
URL : http://doi.org/10.3233/jcs-1992-1203
Viewer's discretion : Host security in mobile code systems, 1998. ,
The anatomy of the grid : Enabling scalable virtual organizations, International Journal of High Performance Computing Applications, vol.15, issue.3, 2001. ,
Globus: a Metacomputing Infrastructure Toolkit, International Journal of High Performance Computing Applications, vol.11, issue.2, pp.115-128, 1997. ,
DOI : 10.1177/109434209701100205
The Physiology of the Grid, 2002. ,
DOI : 10.1002/0470867167.ch8
Understanding code mobility, IEEE Transactions on Software Engineering, vol.24, issue.5, pp.342-361, 1998. ,
DOI : 10.1109/32.685258
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.195.3690
Design Patterns : Elements of Reusable Object-Oriented Software, 1996. ,
The Digital Distributed System Security Architecture, Proc. 12th NIST-NCSC National Computer Security Conference, pp.305-319, 1989. ,
Building a secure computer system, 1988. ,
Result checking in global computing systems, Proceedings of the 17th annual international conference on Supercomputing , ICS '03, pp.226-233, 2003. ,
DOI : 10.1145/782814.782846
Mobile code paradigms and technologies: A case study, Proceedings of the 1 st International Workshop on Mobile Agents (MA '97, pp.39-49, 1997. ,
DOI : 10.1007/3-540-62803-7_22
A secure environment for untrusted helper applications, Proceedings of the 6th Usenix Security Symposium, 1996. ,
Computational issues in secure interoperation, IEEE Transactions on Software Engineering, vol.22, issue.1, pp.43-52, 1996. ,
DOI : 10.1109/32.481533
The Java(TM) Language Specification, 1996. ,
Mobile agents: the next generation in distributed computing, Proceedings of IEEE International Symposium on Parallel Algorithms Architecture Synthesis, pp.8-24, 1997. ,
DOI : 10.1109/AISPAS.1997.581620
D???Agents: Security in a Multiple-Language, Mobile-Agent System, Mobile Agents and Security, pp.154-187, 1998. ,
DOI : 10.1007/3-540-68671-1_9
Metapolicies II, 15th National Computer Security Conference, pp.369-378, 1992. ,
DOI : 10.1145/147092.147097
Objets Mobiles : conception d'un middleware et évaluation de la communication, 2002. ,
Reflection and metalevel architectures in object-oriented programming (workshop session), Proceedings of the European conference on Object-oriented programming addendum : systems, languages, and applications, pp.73-80, 1991. ,
A security model for Aglets, IEEE Internet Computing, vol.1, issue.4, pp.68-77, 1997. ,
DOI : 10.1109/4236.612220
Agent Server Architecture for the Ajanta Mobile- Agent System, Proceedings of the 1998 International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA'98), 1998. ,
Security in the ajanta mobile agent system. Software, Practice and Experience, pp.301-329, 2001. ,
Elliptic curve cryptosystems, Mathematics of Computation, vol.48, issue.177, pp.203-209, 1987. ,
DOI : 10.1090/S0025-5718-1987-0866109-5
HMAC : Keyed-Hashing for Message Authentication, 1997. ,
DOI : 10.17487/rfc2104
A Probabilistic Approach for Task and Result Certification of Large-Scale Distributed Applications in Hostile Environments, European Grid Conference EGC'2005, pp.14-16, 2005. ,
DOI : 10.1007/11508380_34
Protection, Proceedings of the 5th Princeton Conf. on Information Sciences and Systems, pp.18-24, 1971. ,
A Note on the Confinement Problem, Communications of the ACM, vol.16, issue.10, pp.613-615, 1973. ,
Dependability : Basic Concepts and Terminology. Dependable Computing and Fault-Tolerant Systems, 1992. ,
DOI : 10.1007/978-3-7091-9170-5_1
Selecting Cryptographic Key Sizes, Public Key Cryptography, pp.446-465, 2000. ,
Capability-Based Computer Systems, 1984. ,
Programming with Java IDL, 1998. ,
The core Legion object model, Proceedings of 5th IEEE International Symposium on High Performance Distributed Computing HPDC-96, 1996. ,
DOI : 10.1109/HPDC.1996.546226
Generic Security Service Application Program Interface Version 2, 2000. ,
DOI : 10.17487/rfc2078
SecureUML: A UML-Based Modeling Language for Model-Driven Security, UML '02 : Proceedings of the 5th International Conference on The Unified Modeling Language, pp.426-441, 2002. ,
DOI : 10.1007/3-540-45800-X_33
Mobile Code Security, Proceedings of ISYPAR 2000, 2000. ,
Computational Reflection, 1987. ,
DOI : 10.1007/978-3-642-73005-4_27
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.149.6041
Linear Cryptanalysis Method for DES Cipher, Advances in Cryptology ? Eurocrypt '93, pp.386-397, 1994. ,
DOI : 10.1007/3-540-48285-7_33
An Implementation of a Secure Web Client Using SPKI/SDSI Certificates . Master's thesis, Massachusetts Institute of Technology, 1999. ,
A hookup theorem for multilevel security, IEEE Transactions on Software Engineering, vol.16, issue.6, pp.563-568, 1990. ,
DOI : 10.1109/32.55085
Transparent forwarding : First steps In Conference proceedings on Object-oriented programming systems, languages and applications, pp.331-341, 1987. ,
Securing Java : Getting Down to Business with Mobile Code, 1999. ,
The algebra of security, Proceedings. 1988 IEEE Symposium on Security and Privacy, pp.2-7, 1988. ,
DOI : 10.1109/SECPRI.1988.8092
A general theory of composition for a class of "possibilistic" properties, IEEE Transactions on Software Engineering, vol.22, issue.1, pp.53-67, 1996. ,
DOI : 10.1109/32.481534
Secure communications over insecure channels, Communications of ACM, vol.21, issue.4, pp.294-299, 1978. ,
The Art Of Intrusion : The Real Stories Behind The Exploits Of Hackers, 2005. ,
A Java implementation of Simple Distributed Security Infrastructure. Master's thesis, Massachusetts Institute of Technology, 1998. ,
The Legion Grid Portal, Concurrency and Computation: Practice and Experience, vol.10, issue.13-15, 2001. ,
DOI : 10.1002/cpe.672
Proxy-based authorization and accounting for distributed systems, [1993] Proceedings. The 13th International Conference on Distributed Computing Systems, pp.283-291, 1993. ,
DOI : 10.1109/ICDCS.1993.287698
Designing a secure and reconfigurable metaobject protocol, 1999. ,
Encapsulators : A new software paradigm in smalltalk-80, Proceedings of OOPSLA'86, pp.341-346, 1986. ,
Security mechanisms for the MAP agent system, Proceedings 8th Euromicro Workshop on Parallel and Distributed Processing, 2000. ,
DOI : 10.1109/EMPDP.2000.823398
MAP: Design and implementation of a mobile agents' platform, Journal of Systems Architecture, vol.46, issue.2, 1997. ,
DOI : 10.1016/S1383-7621(98)00076-9
Meta objects for access control, Proceedings of the 1997 workshop on New security paradigms , NSPW '97, pp.17-22, 1998. ,
DOI : 10.1145/283699.283735
Meta objects for access control: Role-based principals, Australasian Conference on Information Security and Privacy, pp.296-307, 1998. ,
DOI : 10.1007/BFb0053742
A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978. ,
DOI : 10.1145/359340.359342
Mobile Code Security, IEEE Internet Computing, vol.2, issue.6, pp.30-34, 1998. ,
The Legion Vision of a Worldwide Virtual Computer, Communications of the ACM, vol.40, issue.1, pp.39-45, 1997. ,
The NIST model for role-based access control, Proceedings of the fifth ACM workshop on Role-based access control , RBAC '00, pp.47-63, 2000. ,
DOI : 10.1145/344287.344301
Sabotage-tolerance mechanisms for volunteer computing systems, CCGRID '01 : Proceedings of the 1st International Symposium on Cluster Computing and the Grid, 2001. ,
The role-based access control system of a European bank, Proceedings of the sixth ACM symposium on Access control models and technologies , SACMAT '01, pp.3-9, 2001. ,
DOI : 10.1145/373256.373257
A definition of peer-to-peer networking for the classification of peerto-peer architectures and applications, IEEE International Conference on Peer-to-Peer Computing (P2P2001), 2001. ,
Reflection and Semantics in Lisp, POPL'84 : conference record of the Annual ACM symposium on Principles of Programming Languages, pp.23-35, 1984. ,
Kerberos : An authentication service for open network systems, Winter 1988 USENIX Conference, pp.191-201, 1988. ,
Java remote method invocation specification, 1998. ,
Mobile agent security and Telescript, COMPCON '96. Technologies for the Information Superhighway Digest of Papers, 1996. ,
DOI : 10.1109/CMPCON.1996.501749
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.54.4481
Une architecture de sécurité pour les applications réflexives, Application à Java, 2002. ,
Under the hood : The architecture of aglets. JavaWorld : IDG's magazine for the Java community, 1997. ,
Software reliability via run-time result-checking From Dalang to Kava ? the evolution of a reflective Java extension, Proceedings of the second international conference Reflection'99, number 1616 in Lecture Notes in Computer Science, pp.826-849, 1997. ,
X.509 proxy certificates for dynamic delegation, 2004. ,
Security for Grid services, High Performance Distributed Computing, 2003. Proceedings. 12th IEEE International Symposium on, 2003. ,
DOI : 10.1109/HPDC.2003.1210015
Grid-based file access: the Legion I/O model, Proceedings the Ninth International Symposium on High-Performance Distributed Computing, pp.165-173, 2000. ,
DOI : 10.1109/HPDC.2000.868647
LegionFS, Proceedings of the 2001 ACM/IEEE conference on Supercomputing (CDROM) , Supercomputing '01, 2001. ,
DOI : 10.1145/582034.582093
A New Model of Security for Distributed Systems, Proceedings of the UCLA conference on New security paradigms workshops, pp.34-43, 1996. ,
Pretty Good Privacy : public key encryption for the masses In Building in big brother : the cryptographic policy debate, pp.93-107, 1995. ,