13.05.2014 Views

these doctorat une architecture de securité

these doctorat une architecture de securité

these doctorat une architecture de securité

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

BIBLIOGRAPHIE<br />

tel-00239252, version 1 - 5 Feb 2008<br />

[38] William M. Farmer, Joshua D. Guttman, and Vipin Swarup. Security for mobile agents :<br />

Authentication and state appraisal. In Elisa Bertino, Helmut Kurth, Giancarlo Martella,<br />

and Emilio Montolivo, editors, Computer Security-ESORICS 96. 4th European Symposium<br />

on Research in Computer Security Proceedings, number 1146 in Lecture Notes in Computer<br />

Science, pages 118–130, Rome, Italy, September 1996. Springer.<br />

[39] William M. Farmer, Joshua D. Guttman, and Vipin Swarup. Security for mobile agents :<br />

Issues and requirements. In Proceedings of the 19th National Information Systems Security<br />

Conference, pages 591–597, Baltimore, Md., October 1996.<br />

[40] D.F. Ferraiolo and D.R. Kuhn. Role based access control. In 15th National Computer<br />

Security Conference, pages 554–563, 1992.<br />

[41] Adam Ferrari, Fre<strong>de</strong>rick Knabe, Marty Humphrey, Steve Chapin, and Andrew Grimshaw.<br />

A flexible security system for metacomputing environments. Technical Report CS-98-36,<br />

1, 1998.<br />

[42] Adam Ferrari, Fre<strong>de</strong>rick Knabe, Marty Humphrey, Steve J. Chapin, and Andrew S. Grimshaw.<br />

A Flexible Security System for Metacomputing Environments. In Peter M. A. Sloot,<br />

Marian Bubak, Alfons G. Hoekstra, and Louis O. Hertzberger, editors, HPCN Europe, volume<br />

1593 of Lecture Notes in Computer Science, pages 370–380. Springer, 1999.<br />

[43] S. Foley. Aggregation and Separation as Noninterference Properties. Journal of Computer<br />

Security, 1(2) :159–188, 1992.<br />

[44] Philip W. L. Fong. Viewer’s discretion : Host security in mobile co<strong>de</strong> systems. Technical<br />

Report SFU CMPT TR 1998-19, School of Computing Science, Simon Fraser University,<br />

Burnaby, BC, November 1998.<br />

[45] I. Foster, Kesselman, C., and S. Tuecke. The anatomy of the grid : Enabling scalable virtual<br />

organizations. International Journal of High Performance Computing Applications, 15 (3),<br />

2001.<br />

[46] I. Foster and C. Kesselman. Globus : A metacomputing infrastructure toolkit. Int. Journal<br />

of Supercomputer Applications, 11(2) :115–128, 1997.<br />

[47] Ian Foster, Carl Kesselman, Jeffrey M. Nick, and Steven Tuecke. The Physiology of<br />

the Grid : An Open Grid Services Architecture for Distributed Systems Integration.<br />

http ://www.globus.org/research/papers/ogsa.pdf, January 2002.<br />

[48] A. Fuggetta, G.P. Picco, and G. Vigna. Un<strong>de</strong>rstanding Co<strong>de</strong> Mobility. IEEE Transactions<br />

on Software Engineering, 24(5) :342–361, May 1998.<br />

[49] E. Gamma, R. Helm, R. Johnson, and J. Vlissi<strong>de</strong>s. Design Patterns : Elements of Reusable<br />

Object-Oriented Software. Addison Wesley, Reading, 1996.<br />

[50] M. Gasser, A. Goldstein, C. Kaufman, and B. Lampson. The Digital Distributed System<br />

Security Architecture. In Proc. 12th NIST-NCSC National Computer Security Conference,<br />

pages 305–319, 1989.<br />

[51] Morrie Gasser. Building a secure computer system. Van Nostrand Reinhold Co., New York,<br />

NY, USA, 1988.<br />

[52] Cécile Germain-Renaud and Nathalie Playez. Result checking in global computing systems.<br />

In ICS ’03 : Proceedings of the 17th annual international conference on Supercomputing,<br />

pages 226–233, New York, NY, USA, 2003. ACM Press.<br />

[53] C. Ghezzi and G. Vigna. Mobile Co<strong>de</strong> Paradigms and Technologies : A Case Study. In K. Rothermel<br />

and R. Popescu-Zeletin, editors, Proceedings of the 1 st International Workshop on<br />

Mobile Agents (MA ’97), volume 1219 of LNCS, pages 39–49, Berlin, Germany, April 1997.<br />

Springer-Verlag.<br />

[54] Ian Goldberg, David Wagner, Randi Thomas, and Eric A. Brewer. A secure environment<br />

for untrusted helper applications. In Proceedings of the 6th Usenix Security Symposium,<br />

San Jose, CA, USA, 1996.<br />

[55] Li Gong and Xiaolei Qian. Computational issues in secure interoperation. Software Engineering,<br />

22(1) :43–52, 1996.<br />

5

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!