-
1
-
-
35048825082
-
A calculus for access control in distributed systems (invited)
-
J. Feigenbaum, (ed.), Lecture Notes in Computer Science, Springer: Berlin, Germany
-
M. Abadi, M. Burrows, B. Lampson, and G. Plotkin, "A calculus for access control in distributed systems (invited)," in J. Feigenbaum, (ed.), Proceedings of Advances in Cryptology (CRYPTO '91), vol. 576, Lecture Notes in Computer Science, Springer: Berlin, Germany, 1992, pp. 1-23.
-
(1992)
Proceedings of Advances in Cryptology (CRYPTO '91)
, vol.576
, pp. 1-23
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.4
-
2
-
-
0043222760
-
Sumatra: A Language for Resource-Aware Programs
-
Lecture Notes in Computer Science, Springer-Verlag: Berlin, April
-
A. Acharya, M. Ranganathan, and J. Saltz, "Sumatra: A Language for Resource-Aware Programs," in Mobile Object Systems: Towards the Programmable Internet, vol. 1222, Lecture Notes in Computer Science, Springer-Verlag: Berlin, April 1997.
-
(1997)
Mobile Object Systems: Towards the Programmable Internet
, vol.1222
-
-
Acharya, A.1
Ranganathan, M.2
Saltz, J.3
-
4
-
-
0004058383
-
-
Technical Report UUCS-98-015, University of Utah, Department of Computer Science, 6 August
-
G. Back, P. Tullmann, L. Stoller, W. C. Hsieh, and J. Lepreau, "Java operating systems: Design and implementation," Technical Report UUCS-98-015, University of Utah, Department of Computer Science, 6 August 1998.
-
(1998)
Java Operating Systems: Design and Implementation
-
-
Back, G.1
Tullmann, P.2
Stoller, L.3
Hsieh, W.C.4
Lepreau, J.5
-
5
-
-
84958954168
-
Exploiting code mobility in decentralized and flexible network management
-
April Berlin, Germany
-
M. Baldi, S. Gai, and G. P. Picco, "Exploiting code mobility in decentralized and flexible network management," in Proceedings of the First International Workshop on Mobile Agents, April 1997. pp. 13-26, Berlin, Germany.
-
(1997)
Proceedings of the First International Workshop on Mobile Agents
, pp. 13-26
-
-
Baldi, M.1
Gai, S.2
Picco, G.P.3
-
6
-
-
0000368626
-
Mole - Concepts of a mobile agent system
-
J. Baumann, F. Hohl, K. Rothermel, and M. Strasser, "Mole - Concepts of a mobile agent system," World Wide Web, vol. 1(3), pp. 123-137, 1998.
-
(1998)
World Wide Web
, vol.1
, Issue.3
, pp. 123-137
-
-
Baumann, J.1
Hohl, F.2
Rothermel, K.3
Strasser, M.4
-
7
-
-
80054992065
-
Extensibility, safety and performance in the SPIN operating system
-
Copper Mountan, Colorado, December
-
B. N. Bershad, S. Savage, P. Pardyak, E. G. Sirer, M. Fiuczynski, D. Becker, S. Eggers, and C. Chambers, "Extensibility, safety and performance in the SPIN operating system," in Proceedings of the 15th Symposium on Operating Systems Principles, Copper Mountan, Colorado, December 1995, pp. 267-284.
-
(1995)
Proceedings of the 15th Symposium on Operating Systems Principles
, pp. 267-284
-
-
Bershad, B.N.1
Savage, S.2
Pardyak, P.3
Sirer, E.G.4
Fiuczynski, M.5
Becker, D.6
Eggers, S.7
Chambers, C.8
-
8
-
-
0033203811
-
Confined types
-
Denver, Colorado, USA, November
-
B. Bokowski and J. Vitek, "Confined types," in Proceedings of the 14th Annual ACM SIGPLAN Conference on Object-Oriented Programming Systems, Languages, and Applications (OOPSLA '99), Denver, Colorado, USA, November 1999.
-
(1999)
Proceedings of the 14th Annual ACM SIGPLAN Conference on Object-Oriented Programming Systems, Languages, and Applications (OOPSLA '99)
-
-
Bokowski, B.1
Vitek, J.2
-
9
-
-
0041720124
-
JAZZ, compression of Java bytecode
-
Q. Bradley, R. Horspool, and J. Vitek, "JAZZ, compression of Java bytecode," in GASCON '98, 1998.
-
(1998)
GASCON '98
-
-
Bradley, Q.1
Horspool, R.2
Vitek, J.3
-
11
-
-
84947919695
-
Mobile ambients
-
M. Nivat (ed.), LNCE, Springer-Verlag: Berlin
-
L. Cardelli and A. D. Gordon, "Mobile ambients," in M. Nivat (ed.), Foundations of Software Science and Computational Structures, vol. 1378 in LNCE, Springer-Verlag: Berlin, 1998, pp. 140-155.
-
(1998)
Foundations of Software Science and Computational Structures
, vol.1378
, pp. 140-155
-
-
Cardelli, L.1
Gordon, A.D.2
-
12
-
-
84955594169
-
Mobile Agents: Are They a Good Idea?
-
J. Vitek and C. Tschudin (eds.), Lecture Notes in Computer Science, Springer-Verlag: Berlin, Germany
-
D. Chess, C. G. Harrison, and A. Kershenbaum, "Mobile Agents: Are They a Good Idea?," in J. Vitek and C. Tschudin (eds.), Mobile Object Systems-Towards the Programmable Internet, Lecture Notes in Computer Science, Springer-Verlag: Berlin, Germany, 1997, pp. 25-47.
-
(1997)
Mobile Object Systems-Towards the Programmable Internet
, pp. 25-47
-
-
Chess, D.1
Harrison, C.G.2
Kershenbaum, A.3
-
13
-
-
0002380598
-
Security issues in mobile code systems
-
G. Vigna (ed.), Lecture Notes in Computer Science, Springer-Verlag: New York
-
D. M. Chess, "Security issues in mobile code systems," in G. Vigna (ed.), Mobile Agents and Security, vol. 1419, Lecture Notes in Computer Science, Springer-Verlag: New York, 1998.
-
(1998)
Mobile Agents and Security
, vol.1419
-
-
Chess, D.M.1
-
14
-
-
0012073784
-
JRes: A resource accounting interface for Java
-
October
-
G. Czajkowski and T. von Eicken, "JRes: A resource accounting interface for Java," ACMSIGPLAN Notices, vol. 33(10), pp. 21-35, October 1998.
-
(1998)
ACMSIGPLAN Notices
, vol.33
, Issue.10
, pp. 21-35
-
-
Czajkowski, G.1
Von Eicken, T.2
-
15
-
-
0016949746
-
A lattice model of secure information flow
-
D. Denning, "A lattice model of secure information flow," Communications of the ACM, vol. 19(5), pp. 236-243, 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.1
-
16
-
-
0027287175
-
Assuring distributed trusted mach
-
IEEE, editor, San Antonio, TX, USA, 15-17 December 1109 Spring Street, Suite 300, Silver Spring, MD 20910, USA, IEEE Computer Society Press: Silver Spring, MD, 1993, pp. 206-217
-
T. Fine and S. E. Minear, "Assuring distributed trusted mach," in IEEE, editor, Proceedings of the 32nd IEEE Conference on Decision and Control, San Antonio, TX, USA, 15-17 December 1993, pages 206-217, 1109 Spring Street, Suite 300, Silver Spring, MD 20910, USA, IEEE Computer Society Press: Silver Spring, MD, 1993, pp. 206-217.
-
(1993)
Proceedings of the 32nd IEEE Conference on Decision and Control
, pp. 206-217
-
-
Fine, T.1
Minear, S.E.2
-
17
-
-
0003246945
-
SLIC: An extensibility system for commodity operating systems
-
Berkeley, USA, USENIX Association, 15-19 June
-
D. P. Ghormley, D. Petrou, S. H. Rodrigues, and T. E. Anderson, "SLIC: An extensibility system for commodity operating systems," in Proceedings of the USENIX 1998 Annual Technical Conference, Berkeley, USA, USENIX Association, 15-19 June 1998, pp. 39-52.
-
(1998)
Proceedings of the USENIX 1998 Annual Technical Conference
, pp. 39-52
-
-
Ghormley, D.P.1
Petrou, D.2
Rodrigues, S.H.3
Anderson, T.E.4
-
18
-
-
0013080960
-
-
Technical Report CSD-96-920, University of California, Berkeley, 9 April
-
D. P. Ghormley, S. H. Rodrigues, D. Petrou, and T. E. Anderson, "Interposition as an operating system extension mechanism," Technical Report CSD-96-920, University of California, Berkeley, 9 April 1997.
-
(1997)
Interposition as an Operating System Extension Mechanism
-
-
Ghormley, D.P.1
Rodrigues, S.H.2
Petrou, D.3
Anderson, T.E.4
-
19
-
-
0342695171
-
A secure environment for untrusted helper applications
-
San Jose, CA, July
-
I. Goldberg, D. Wagner, R. Thomas, and E. A. Brewer, "A secure environment for untrusted helper applications," in Proceedings of the 6th Usenix Security Symposium, San Jose, CA, July 1996.
-
(1996)
Proceedings of the 6th Usenix Security Symposium
-
-
Goldberg, I.1
Wagner, D.2
Thomas, R.3
Brewer, E.A.4
-
22
-
-
0003802908
-
-
Technical Report PCS-TR98-327, Dartmouth College, Computer Science, Hanover, NH, January
-
R. S. Gray, "Agent Tel: A flexible and secure mobile-agent system," Technical Report PCS-TR98-327, Dartmouth College, Computer Science, Hanover, NH, January 1998.
-
(1998)
Agent Tel: A Flexible and Secure Mobile-agent System
-
-
Gray, R.S.1
-
23
-
-
0003709440
-
The spring nucleus: A micro-kernel for objects
-
Ohio, USA, June
-
G. Hamilton and G. Kougioris, "The spring nucleus: a micro-kernel for objects," in Proceedings of the Usenix Summer Conference, Ohio, USA, June 1994, pp. 147-159.
-
(1994)
Proceedings of the Usenix Summer Conference
, pp. 147-159
-
-
Hamilton, G.1
Kougioris, G.2
-
24
-
-
84947936279
-
-
Technical Report 97-1660, Cornell University, Department of Computer Science
-
C. Hawblitzel, C.-C. Chang, G. Czajkowski, D. Hu, and T. von Eicken, "Implementing Multiple Protection Domains in Java," Technical Report 97-1660, Cornell University, Department of Computer Science, 1997.
-
(1997)
Implementing Multiple Protection Domains in Java
-
-
Hawblitzel, C.1
Chang, C.-C.2
Czajkowski, G.3
Hu, D.4
Von Eicken, T.5
-
25
-
-
0043222755
-
An Actor-based architecture for customizing and controlling agent ensembles
-
N. Jamali, P. Thati, and G. A. Agha, "An Actor-based architecture for customizing and controlling agent ensembles," IEEE Intelligent Systems, 1998.
-
(1998)
IEEE Intelligent Systems
-
-
Jamali, N.1
Thati, P.2
Agha, G.A.3
-
28
-
-
0015672289
-
A note on the confinement problem
-
B. W. Lampson, "A note on the confinement problem," Communications of the ACM, vol. 16, 1973.
-
(1973)
Communications of the ACM
, vol.16
-
-
Lampson, B.W.1
-
30
-
-
0003640863
-
-
Addison-Wesley: Reading, MA, USA, September
-
D. B. Lange and M. Oshima, Programming and Deploying Mobile Agents with Java Aglets, Addison-Wesley: Reading, MA, USA, September 1998.
-
(1998)
Programming and Deploying Mobile Agents with Java Aglets
-
-
Lange, D.B.1
Oshima, M.2
-
32
-
-
0005047428
-
Commercialization of electronic information
-
April-June
-
J. -H. Morin and D. Konstantas, "Commercialization of electronic information," Journal of End User Computing, vol. 12(2), pp. 20-32, April-June 2000.
-
(2000)
Journal of End User Computing
, vol.12
, Issue.2
, pp. 20-32
-
-
Morin, J.-H.1
Konstantas, D.2
-
34
-
-
4043174205
-
-
Lecture Notes in Computer Science
-
J. K. Ousterhout, J. Y. Levy, and B. B. Welch, The Safe-Tcl Security Model, vol. 1419, Lecture Notes in Computer Science, 1998, pp. 217-234.
-
(1998)
The Safe-Tcl Security Model
, vol.1419
, pp. 217-234
-
-
Ousterhout, J.K.1
Levy, J.Y.2
Welch, B.B.3
-
35
-
-
0003197918
-
Protecting mobile agents against malicious hosts
-
G. Vigna (ed.), Lecture Notes in Computer Science, Springer-Verlag, New York
-
T. Sander and C. F. Tschudin, "Protecting mobile agents against malicious hosts," in G. Vigna (ed.), Mobile Agents and Security, vol. 1419, Lecture Notes in Computer Science, Springer-Verlag, New York, 1998.
-
(1998)
Mobile Agents and Security
, vol.1419
-
-
Sander, T.1
Tschudin, C.F.2
-
36
-
-
84998616872
-
Disseminating mobile agents for distributed information filtering
-
Palm Springs, CA, USA, October
-
W. Theilmann and K. Rothermel, "Disseminating mobile agents for distributed information filtering," in First International Symposium on Agent Systems and Applications (ASA '99)/Third International Symposium on Mobile Agents (MA '99), Palm Springs, CA, USA, October 1999, pp. 152-161.
-
(1999)
First International Symposium on Agent Systems and Applications (ASA '99)/Third International Symposium on Mobile Agents (MA '99)
, pp. 152-161
-
-
Theilmann, W.1
Rothermel, K.2
-
37
-
-
85021432654
-
-
Tromsø University and Cornell University, TACOMA Project, http://www.cs.uit.no/DOS/Tacoma/.
-
-
-
-
38
-
-
84955613593
-
The messenger environment M0 - A condensed description
-
Lecture Notes in Computer Science, Springer-Verlag: Berlin
-
C. Tschudin, "The messenger environment M0 - A condensed description," in Mobile Object Systems: Towards the Programmable Internet, vol. 1222, Lecture Notes in Computer Science, Springer-Verlag: Berlin 1997, pp. 149-156.
-
(1997)
Mobile Object Systems: Towards the Programmable Internet
, vol.1222
, pp. 149-156
-
-
Tschudin, C.1
-
39
-
-
0042220491
-
-
Lecture Notes in Computer Science, Springer-Verlag: New York
-
G. Vigna, Cryptographic Traces for Mobile Agents, vol. 1419, Lecture Notes in Computer Science, Springer-Verlag: New York, 1998, pp. 137-149.
-
(1998)
Cryptographic Traces for Mobile Agents
, vol.1419
, pp. 137-149
-
-
Vigna, G.1
-
40
-
-
0003912019
-
-
Lecture Notes in Computer Science, Springer-Verlag: New York, USA
-
G. Vigna, Mobile Agents and Security, vol. 1419, Lecture Notes in Computer Science, Springer-Verlag: New York, USA, 1998.
-
(1998)
Mobile Agents and Security
, vol.1419
-
-
Vigna, G.1
-
42
-
-
0030370740
-
A sound type system for secure flow analysis
-
May
-
D. Volpano, C. Irvine, and G. Smith, "A sound type system for secure flow analysis," Journal of Computer Security, vol. 4, pp. 167-187, May 1996.
-
(1996)
Journal of Computer Security
, vol.4
, pp. 167-187
-
-
Volpano, D.1
Irvine, C.2
Smith, G.3
-
43
-
-
84982069422
-
-
Lecture Notes in Computer Science
-
T. Von Eicken, C.-C. Chang, G. Czajkowski, and C. Hawblitzel, J-Kernel: A Capability-Based Operating System for Java, vol. 1603, Lecture Notes in Computer Science, 1999, pp. 369-394.
-
(1999)
J-Kernel: A Capability-Based Operating System for Java
, vol.1603
, pp. 369-394
-
-
Von Eicken, T.1
Chang, C.-C.2
Czajkowski, G.3
Hawblitzel, C.4
-
44
-
-
0003952912
-
-
White paper, General Magic, Inc: Mountain View, CA
-
J. E. White, "Telescript technology: The foundation for the electronic marketplace," White paper, General Magic, Inc: Mountain View, CA, 1994.
-
(1994)
Telescript Technology: The Foundation for the Electronic Marketplace
-
-
White, J.E.1
-
45
-
-
26844544709
-
On the problem of trust in mobile agent systems
-
Internet Society, March
-
U. G. Wilhelm, L. Buttyàn, and S. Staamann, "On the problem of trust in mobile agent systems," in Symposium on Network and Distributed System Security, Internet Society, March 1998.
-
(1998)
Symposium on Network and Distributed System Security
-
-
Wilhelm, U.G.1
Buttyàn, L.2
Staamann, S.3
|