]. C. Adams, The Simple Public-Key GSS-API Mechanism (SPKM), 1996.
DOI : 10.17487/rfc2025

A. Alireza, U. Lang, M. Padelis, R. Schreiner, and M. Schumacher, The Challenges of CORBA Security, Workshop Sicherheit in Mediendaten, Gesellschaft für Informatik (GI), pp.61-72, 2000.
DOI : 10.1007/978-3-642-58346-9_6

I. Attali, D. Caromel, and A. Contes, Hierarchical and Declarative Security for Grid Applications, Proceedings of the International Conference On High Performance Computing, 2003.
DOI : 10.1007/978-3-540-24596-4_39

I. Attali, D. Caromel, and A. Contes, Une architecture de sécurité déclarative et hiérarchique pour les grilles de calcul, INRIA, editor, 2ème rencontre francophone sur le thème Sécurité et Architecture Réseau, pp.203-212, 2003.

I. Attali, D. Caromel, and A. Contes, Deployment-Based Security for Grid Applications, The International Conference on Computational Science (ICCS 2005), 2005.
DOI : 10.1007/11428831_65

L. Baduel, F. Baude, and D. Caromel, Object-Oriented SPMD with Active Object, Proceedings of Cluster Computing and Grid, 2005.

D. Basin, F. Rittinger, and L. Viganò, A Formal Analysis of the CORBA Security Service, ZB 2002 : Formal Specification and Development in Z and B, pp.330-349, 2002.
DOI : 10.1007/3-540-45648-1_17

F. Baude, D. Caromel, L. Mestre, F. Huet, and J. Vayssière, Interactive and descriptor-based deployment of object-oriented grid applications, Proceedings 11th IEEE International Symposium on High Performance Distributed Computing, pp.93-102, 2002.
DOI : 10.1109/HPDC.2002.1029907

F. Baude, D. Caromel, C. Delbé, and L. Henrio, A Hybrid Message Logging-CIC Protocol for Constrained Checkpointability, Proceedings of EuroPar2005, 2005.
DOI : 10.1007/11549468_71

F. Baude, D. Caromel, and M. Morel, From Distributed Objects to Hierarchical Grid Components, International Symposium on Distributed Objects and Applications (DOA), 2003.
DOI : 10.1007/978-3-540-39964-3_78

D. E. Bell and L. J. Lapadula, Secure computer system : Unified exposition and multics interpretation, 1976.

J. K. Bennett, The design and implementation of distributed Smalltalk, ACM SIGPLAN Notices, vol.22, issue.12, pp.318-330, 1987.
DOI : 10.1145/38807.38836

T. A. Berson, Differential cryptanalysis mod 2 32 with applications to MD5, Advances in Cryptology ? Eurocrypt '92, 1992.

K. Biba, Integrity consideration for secure computer systems, 1975.

E. Biham and A. Shamir, Differential cryptanalysis of DES-like cryptosystems, Proceedings of CRYPTO 90, pp.2-21, 1991.

B. Blakley, . Corba, and . Security, Object Technology Series, 1999.

J. Briot and R. Guerraoui, Objets pour la programmation parallèle et répartie : intérêts, évolutions et tendances, Technique et Science Informatiques (TSI), vol.15, issue.6, pp.765-800, 1996.

E. Bruneton, T. Coupaye, and J. Stefani, Recursive and Dynamic Software Composition with Sharing, Proceedings of the Seventh International Workshop on Component-Oriented Programming at ECOOP, 2002.

M. Burnside, D. Clarke, T. Mills, A. Maywah, S. Devadas et al., Proxy-based security protocols in networked mobile devices, Proceedings of the 2002 ACM symposium on Applied computing , SAC '02, pp.265-272, 2002.
DOI : 10.1145/508791.508845

N. Chen, A case study of the ejb security : Combining declarative, role-based access control with programmatic application-specific proxy security checks, PDPTA '02 : Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, pp.1344-1347, 2002.

D. Chess, C. Harrison, and A. Kershenbaum, Mobile agents: Are they a good idea?, IBM, Yorktown Heights, 1994.
DOI : 10.1007/3-540-62852-5_4

D. Clark and D. R. Wilson, A Comparison of Commercial and Military Computer Security Policies, 1987 IEEE Symposium on Security and Privacy, pp.184-194, 1987.
DOI : 10.1109/SP.1987.10001

E. Cohen and D. Jefferson, Protection in the Hydra Operating System, ACM SIGOPS Operating Systems Review, vol.9, issue.5, pp.141-160, 1975.
DOI : 10.1145/1067629.806532

H. De-meer, J. Richter, A. Puliafito, and O. Tomarchio, Tunnel agents for enhanced Internet QoS, IEEE Concurrency, vol.6, issue.2, pp.30-39, 1998.
DOI : 10.1109/4434.678787

N. Demytko, A New Elliptic Curve Based Analogue of RSA, Lecture Notes in Computer Science, vol.765, pp.40-49, 1994.
DOI : 10.1007/3-540-48285-7_4

R. H. Deng, S. K. Bhonsle, W. Wang, and A. A. Lazar, Integrating security in CORBA based object architectures, Proceedings 1995 IEEE Symposium on Security and Privacy, pp.50-61, 1995.
DOI : 10.1109/SECPRI.1995.398922

A. Di and C. , Modèle et infrastructure de programmation pair-à-pair. Master's thesis, 2004.

W. Diffie and M. E. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.22644-654, 1976.
DOI : 10.1109/TIT.1976.1055638

A. Diller, An Introduction to Formal Methods, 1994.

H. Dobbertin, Cryptanalysis of MD4, Fast Software Encryption Workshop, pp.53-69, 1996.
DOI : 10.1007/3-540-60865-6_43

C. Ellison, SPKI Requirements, RFC 2692, IETF, 1999.
DOI : 10.17487/rfc2692

C. M. Ellison, B. Frantz, B. Lampson, R. Rivest, B. M. Thomas et al., SPKI Certificate Theory, RFC 2693, 1999.
DOI : 10.17487/rfc2693

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.189.1209

P. Eronen, J. Lehtinen, J. Zitting, and P. Nikander, Extending jini with decentralized trust management, 3rd IEEE Conference on Open Architectures and Network Programming, pp.25-29, 2000.

W. M. Farmer, J. D. Guttman, and V. Swarup, Security for mobile agents: Authentication and state appraisal, Computer Security-ESORICS 96. 4th European Symposium on Research in Computer Security Proceedings, number 1146 in Lecture Notes in Computer Science, pp.118-130, 1996.
DOI : 10.1007/3-540-61770-1_31

W. M. Farmer, J. D. Guttman, and V. Swarup, Security for mobile agents : Issues and requirements, Proceedings of the 19th National Information Systems Security Conference, pp.591-597, 1996.

D. F. Ferraiolo and D. R. Kuhn, Role based access control, 15th National Computer Security Conference, pp.554-563, 1992.

A. Ferrari, F. Knabe, M. Humphrey, S. Chapin, and A. Grimshaw, A flexible security system for metacomputing environments, 1998.
DOI : 10.1007/BFb0100598

A. Ferrari, F. Knabe, M. Humphrey, S. J. Chapin, and A. S. Grimshaw, A flexible security system for metacomputing environments, HPCN Europe, pp.370-380, 1999.
DOI : 10.1007/BFb0100598

S. Foley, Aggregation and Separation as Noninterference Properties, Journal of Computer Security, vol.1, issue.2, pp.159-188, 1992.
DOI : 10.3233/JCS-1992-1203

URL : http://doi.org/10.3233/jcs-1992-1203

W. L. Philip and . Fong, Viewer's discretion : Host security in mobile code systems, 1998.

I. Foster, C. Kesselman, and S. Tuecke, The anatomy of the grid : Enabling scalable virtual organizations, International Journal of High Performance Computing Applications, vol.15, issue.3, 2001.

I. Foster and C. Kesselman, Globus: a Metacomputing Infrastructure Toolkit, International Journal of High Performance Computing Applications, vol.11, issue.2, pp.115-128, 1997.
DOI : 10.1177/109434209701100205

I. Foster, C. Kesselman, J. M. Nick, and S. Tuecke, The Physiology of the Grid, 2002.
DOI : 10.1002/0470867167.ch8

A. Fuggetta, G. P. Picco, and G. Vigna, Understanding code mobility, IEEE Transactions on Software Engineering, vol.24, issue.5, pp.342-361, 1998.
DOI : 10.1109/32.685258

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.195.3690

E. Gamma, R. Helm, R. Johnson, and J. Vlissides, Design Patterns : Elements of Reusable Object-Oriented Software, 1996.

M. Gasser, A. Goldstein, C. Kaufman, and B. Lampson, The Digital Distributed System Security Architecture, Proc. 12th NIST-NCSC National Computer Security Conference, pp.305-319, 1989.

M. Gasser, Building a secure computer system, 1988.

C. Germain-renaud and N. Playez, Result checking in global computing systems, Proceedings of the 17th annual international conference on Supercomputing , ICS '03, pp.226-233, 2003.
DOI : 10.1145/782814.782846

C. Ghezzi and G. Vigna, Mobile code paradigms and technologies: A case study, Proceedings of the 1 st International Workshop on Mobile Agents (MA '97, pp.39-49, 1997.
DOI : 10.1007/3-540-62803-7_22

I. Goldberg, D. Wagner, R. Thomas, and E. A. Brewer, A secure environment for untrusted helper applications, Proceedings of the 6th Usenix Security Symposium, 1996.

L. Gong and X. Qian, Computational issues in secure interoperation, IEEE Transactions on Software Engineering, vol.22, issue.1, pp.43-52, 1996.
DOI : 10.1109/32.481533

J. Gosling, G. Joy, and G. L. Steele, The Java(TM) Language Specification, 1996.

R. Gray, D. Kotz, S. Nog, D. Rus, and G. Cybenko, Mobile agents: the next generation in distributed computing, Proceedings of IEEE International Symposium on Parallel Algorithms Architecture Synthesis, pp.8-24, 1997.
DOI : 10.1109/AISPAS.1997.581620

R. S. Gray, D. Kotz, G. Cybenko, and D. D. Rus, D???Agents: Security in a Multiple-Language, Mobile-Agent System, Mobile Agents and Security, pp.154-187, 1998.
DOI : 10.1007/3-540-68671-1_9

H. Hosmer, Metapolicies II, 15th National Computer Security Conference, pp.369-378, 1992.
DOI : 10.1145/147092.147097

F. Huet, Objets Mobiles : conception d'un middleware et évaluation de la communication, 2002.

H. Mamdouh and . Ibrahim, Reflection and metalevel architectures in object-oriented programming (workshop session), Proceedings of the European conference on Object-oriented programming addendum : systems, languages, and applications, pp.73-80, 1991.

G. Karjoth, D. B. Lange, and M. Oshima, A security model for Aglets, IEEE Internet Computing, vol.1, issue.4, pp.68-77, 1997.
DOI : 10.1109/4236.612220

N. Karnik and A. Tripathi, Agent Server Architecture for the Ajanta Mobile- Agent System, Proceedings of the 1998 International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA'98), 1998.

M. Neeran, A. R. Karnik, and . Tripathi, Security in the ajanta mobile agent system. Software, Practice and Experience, pp.301-329, 2001.

N. Koblitz, Elliptic curve cryptosystems, Mathematics of Computation, vol.48, issue.177, pp.203-209, 1987.
DOI : 10.1090/S0025-5718-1987-0866109-5

H. Krawczyk, M. Bellare, and R. Canetti, HMAC : Keyed-Hashing for Message Authentication, 1997.
DOI : 10.17487/rfc2104

A. W. Krings, J. Roch, S. Jafar, and S. Varrette, A Probabilistic Approach for Task and Result Certification of Large-Scale Distributed Applications in Hostile Environments, European Grid Conference EGC'2005, pp.14-16, 2005.
DOI : 10.1007/11508380_34

W. Butler and . Lampson, Protection, Proceedings of the 5th Princeton Conf. on Information Sciences and Systems, pp.18-24, 1971.

W. Butler and . Lampson, A Note on the Confinement Problem, Communications of the ACM, vol.16, issue.10, pp.613-615, 1973.

J. Laprie, Dependability : Basic Concepts and Terminology. Dependable Computing and Fault-Tolerant Systems, 1992.
DOI : 10.1007/978-3-7091-9170-5_1

K. Arjen, E. R. Lenstra, and . Verheul, Selecting Cryptographic Key Sizes, Public Key Cryptography, pp.446-465, 2000.

M. Henry and . Levy, Capability-Based Computer Systems, 1984.

G. Lewis, S. Barber, and E. Siegel, Programming with Java IDL, 1998.

M. Lewis and A. Grimshaw, The core Legion object model, Proceedings of 5th IEEE International Symposium on High Performance Distributed Computing HPDC-96, 1996.
DOI : 10.1109/HPDC.1996.546226

J. Linn, Generic Security Service Application Program Interface Version 2, 2000.
DOI : 10.17487/rfc2078

T. Lodderstedt, D. A. Basin, and J. Doser, SecureUML: A UML-Based Modeling Language for Model-Driven Security, UML '02 : Proceedings of the 5th International Conference on The Unified Modeling Language, pp.426-441, 2002.
DOI : 10.1007/3-540-45800-X_33

S. Loureiro, R. Molva, and Y. Roudier, Mobile Code Security, Proceedings of ISYPAR 2000, 2000.

P. Maes, Computational Reflection, 1987.
DOI : 10.1007/978-3-642-73005-4_27

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.149.6041

M. Matsui, Linear Cryptanalysis Method for DES Cipher, Advances in Cryptology ? Eurocrypt '93, pp.386-397, 1994.
DOI : 10.1007/3-540-48285-7_33

A. J. Maywah, An Implementation of a Secure Web Client Using SPKI/SDSI Certificates . Master's thesis, Massachusetts Institute of Technology, 1999.

D. Mccullough, A hookup theorem for multilevel security, IEEE Transactions on Software Engineering, vol.16, issue.6, pp.563-568, 1990.
DOI : 10.1109/32.55085

L. Paul and . Mccullough, Transparent forwarding : First steps In Conference proceedings on Object-oriented programming systems, languages and applications, pp.331-341, 1987.

G. Mcgraw and E. W. Felten, Securing Java : Getting Down to Business with Mobile Code, 1999.

J. Mclean, The algebra of security, Proceedings. 1988 IEEE Symposium on Security and Privacy, pp.2-7, 1988.
DOI : 10.1109/SECPRI.1988.8092

J. Mclean, A general theory of composition for a class of "possibilistic" properties, IEEE Transactions on Software Engineering, vol.22, issue.1, pp.53-67, 1996.
DOI : 10.1109/32.481534

C. Ralph and . Merkle, Secure communications over insecure channels, Communications of ACM, vol.21, issue.4, pp.294-299, 1978.

K. D. Mitnick and W. L. Simon, The Art Of Intrusion : The Real Stories Behind The Exploits Of Hackers, 2005.

A. Morcos, A Java implementation of Simple Distributed Security Infrastructure. Master's thesis, Massachusetts Institute of Technology, 1998.

A. Natrajan, A. Nguyen-tuong, and A. Humphrey, The Legion Grid Portal, Concurrency and Computation: Practice and Experience, vol.10, issue.13-15, 2001.
DOI : 10.1002/cpe.672

B. and C. Neuman, Proxy-based authorization and accounting for distributed systems, [1993] Proceedings. The 13th International Conference on Distributed Computing Systems, pp.283-291, 1993.
DOI : 10.1109/ICDCS.1993.287698

A. Oliva and L. E. Buzato, Designing a secure and reconfigurable metaobject protocol, 1999.

G. A. Pascoe, Encapsulators : A new software paradigm in smalltalk-80, Proceedings of OOPSLA'86, pp.341-346, 1986.

A. Puliafito and O. Tomarchio, Security mechanisms for the MAP agent system, Proceedings 8th Euromicro Workshop on Parallel and Distributed Processing, 2000.
DOI : 10.1109/EMPDP.2000.823398

A. Puliafito, O. Tomarchio, and L. Vita, MAP: Design and implementation of a mobile agents' platform, Journal of Systems Architecture, vol.46, issue.2, 1997.
DOI : 10.1016/S1383-7621(98)00076-9

T. Riechmann and F. J. Hauck, Meta objects for access control, Proceedings of the 1997 workshop on New security paradigms , NSPW '97, pp.17-22, 1998.
DOI : 10.1145/283699.283735

T. Riechmann and J. Kleinoder, Meta objects for access control: Role-based principals, Australasian Conference on Information Security and Privacy, pp.296-307, 1998.
DOI : 10.1007/BFb0053742

R. L. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978.
DOI : 10.1145/359340.359342

D. Aviel, J. Rubin, E. Daniel, and . Geer, Mobile Code Security, IEEE Internet Computing, vol.2, issue.6, pp.30-34, 1998.

S. Andrew, W. A. Grimshaw, and . Wulf, The Legion Vision of a Worldwide Virtual Computer, Communications of the ACM, vol.40, issue.1, pp.39-45, 1997.

R. Sandhu, D. Ferraiolo, and R. Kuhn, The NIST model for role-based access control, Proceedings of the fifth ACM workshop on Role-based access control , RBAC '00, pp.47-63, 2000.
DOI : 10.1145/344287.344301

F. G. Luis and . Sarmenta, Sabotage-tolerance mechanisms for volunteer computing systems, CCGRID '01 : Proceedings of the 1st International Symposium on Cluster Computing and the Grid, 2001.

A. Schaad, J. Moffett, and J. Jacob, The role-based access control system of a European bank, Proceedings of the sixth ACM symposium on Access control models and technologies , SACMAT '01, pp.3-9, 2001.
DOI : 10.1145/373256.373257

R. Schollmeier, A definition of peer-to-peer networking for the classification of peerto-peer architectures and applications, IEEE International Conference on Peer-to-Peer Computing (P2P2001), 2001.

B. Cantwell and S. , Reflection and Semantics in Lisp, POPL'84 : conference record of the Annual ACM symposium on Principles of Programming Languages, pp.23-35, 1984.

B. , C. Neuman, J. G. Steiner, and J. I. Schiller, Kerberos : An authentication service for open network systems, Winter 1988 USENIX Conference, pp.191-201, 1988.

S. Microsystems, Java remote method invocation specification, 1998.

J. Tardo and L. Valente, Mobile agent security and Telescript, COMPCON '96. Technologies for the Information Superhighway Digest of Papers, 1996.
DOI : 10.1109/CMPCON.1996.501749

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.54.4481

J. Vayssière, Une architecture de sécurité pour les applications réflexives, Application à Java, 2002.

B. Venners, Under the hood : The architecture of aglets. JavaWorld : IDG's magazine for the Java community, 1997.

H. Wasserman, M. Blum, I. Welch, and R. Stroud, Software reliability via run-time result-checking From Dalang to Kava ? the evolution of a reflective Java extension, Proceedings of the second international conference Reflection'99, number 1616 in Lecture Notes in Computer Science, pp.826-849, 1997.

V. Welch, I. Foster, C. Kesselman, O. Mulmo, L. Pearlman et al., X.509 proxy certificates for dynamic delegation, 2004.

V. Welch, F. Siebenlist, I. Foster, J. Bresnahan, K. Czajkowski et al., Security for Grid services, High Performance Distributed Computing, 2003. Proceedings. 12th IEEE International Symposium on, 2003.
DOI : 10.1109/HPDC.2003.1210015

B. White, A. Grimshaw, and A. Nguyen-tuong, Grid-based file access: the Legion I/O model, Proceedings the Ninth International Symposium on High-Performance Distributed Computing, pp.165-173, 2000.
DOI : 10.1109/HPDC.2000.868647

B. S. White, M. Walker, M. Humphrey, and A. Grimshaw, LegionFS, Proceedings of the 2001 ACM/IEEE conference on Supercomputing (CDROM) , Supercomputing '01, 2001.
DOI : 10.1145/582034.582093

D. Kienzle, W. A. Wulf, and C. Wang, A New Model of Security for Distributed Systems, Proceedings of the UCLA conference on New security paradigms workshops, pp.34-43, 1996.

P. Zimmermann, Pretty Good Privacy : public key encryption for the masses In Building in big brother : the cryptographic policy debate, pp.93-107, 1995.