13.05.2014 Views

these doctorat une architecture de securité

these doctorat une architecture de securité

these doctorat une architecture de securité

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

BIBLIOGRAPHIE<br />

tel-00239252, version 1 - 5 Feb 2008<br />

[56] James Gosling, Guy Steele Bill Joy, and Guy L. Steele. The Java(TM) Language Specification.<br />

Addison Wesley, 1996.<br />

[57] Robert Gray, David Kotz, Saurab Nog, Daniela Rus, and George Cybenko. Mobile agents :<br />

The next generation in distributed computing. In Proceedings of the Second Aizu International<br />

Symposium on Parallel Algorithms and Architectures Synthesis (pAs ’97), pages<br />

8–24, Fukushima, Japan, March 1997. IEEE Computer Society Press.<br />

[58] Robert S. Gray, David Kotz, George Cybenko, and Daniela Rus. D’Agents : Security in<br />

a multiple-language, mobile-agent system. In Giovanni Vigna, editor, Mobile Agents and<br />

Security, volume 1419 of Lecture Notes in Computer Science, pages 154–187. Springer-<br />

Verlag, 1998.<br />

[59] H. Hosmer. Metapolicies II. In 15th National Computer Security Conference, pages 369–<br />

378, Baltimore, MD, October 1992.<br />

[60] Fabrice Huet. Objets Mobiles : conception d’un middleware et évaluation <strong>de</strong> la communication.<br />

PhD thesis, Université <strong>de</strong> Nice-Sophia Antipolis, 2002.<br />

[61] Mamdouh H. Ibrahim. Reflection and metalevel <strong>architecture</strong>s in object-oriented programming<br />

(workshop session). In Proceedings of the European conference on Object-oriented<br />

programming ad<strong>de</strong>ndum : systems, languages, and applications, pages 73–80. ACM Press,<br />

1991.<br />

[62] G. Karjoth, D.B. Lange, and M. Oshima. A Security Mo<strong>de</strong>l for Aglets. IEEE Internet<br />

Computing, 1(4) :68–77, 1997.<br />

[63] Neeran Karnik and Anand Tripathi. Agent Server Architecture for the Ajanta Mobile-<br />

Agent System. In Proceedings of the 1998 International Conference on Parallel and Distributed<br />

Processing Techniques and Applications (PDPTA’98), Las Vegas, 1998.<br />

[64] Neeran M. Karnik and Anand R. Tripathi. Security in the ajanta mobile agent system.<br />

Software, Practice and Experience, 31(4) :301–329, 2001.<br />

[65] N. Koblitz. Elliptic curve cryptosystems. Mathematics of Computation, 48 :203–209, 1987.<br />

[66] H. Krawczyk, M. Bellare, and R. Canetti. HMAC : Keyed-Hashing for Message Authentication,<br />

February 1997. RFC 2104.<br />

[67] Axel W. Krings, Jean-Louis Roch, Samir Jafar, and Sebastien Varrette. A probabilistic<br />

approach for task and result certification of large-scale distributed applications in hostile<br />

environments. In LNCS Springer-Verlag, editor, European Grid Conference EGC’2005,<br />

Amsterdam, The Netherlands, february 14-16 2005.<br />

[68] Butler W. Lampson. Protection. In Proceedings of the 5th Princeton Conf. on Information<br />

Sciences and Systems, Princeton, 1971. Reprinted in ACM Operating Systems Rev. 8, 1<br />

(Jan. 1974), pp 18-24.<br />

[69] Butler W. Lampson. A Note on the Confinement Problem. Communications of the ACM,<br />

16(10) :613–615, 1973.<br />

[70] J.-C. Laprie et al. Dependability : Basic Concepts and Terminology. Dependable Computing<br />

and Fault-Tolerant Systems. Springer-Verlag, Wien, New York, 1992.<br />

[71] Arjen K. Lenstra and Eric R. Verheul. Selecting Cryptographic Key Sizes. In Public Key<br />

Cryptography, pages 446–465, 2000.<br />

[72] Henry M. Levy. Capability-Based Computer Systems. Digital Press, Bedford, Massachusetts,<br />

1984.<br />

[73] Geoffrey Lewis, Steven Barber, and Ellen Siegel. Programming with Java IDL. John Wiley<br />

& Sons, 1998.<br />

[74] Mike Lewis and Andrew Grimshaw. The Core Legion Object Mo<strong>de</strong>l. In Proceedings of<br />

the Fifth IEEE International Symposium on High Performance Distributed Computing,<br />

Syracuse, New York, USA, August 1996. IEEE.<br />

[75] J. Linn. Generic Security Service Application Program Interface Version 2, Update 1, January<br />

2000. RFC 2743.<br />

6

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!