these doctorat une architecture de securité
these doctorat une architecture de securité
these doctorat une architecture de securité
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
BIBLIOGRAPHIE<br />
tel-00239252, version 1 - 5 Feb 2008<br />
[56] James Gosling, Guy Steele Bill Joy, and Guy L. Steele. The Java(TM) Language Specification.<br />
Addison Wesley, 1996.<br />
[57] Robert Gray, David Kotz, Saurab Nog, Daniela Rus, and George Cybenko. Mobile agents :<br />
The next generation in distributed computing. In Proceedings of the Second Aizu International<br />
Symposium on Parallel Algorithms and Architectures Synthesis (pAs ’97), pages<br />
8–24, Fukushima, Japan, March 1997. IEEE Computer Society Press.<br />
[58] Robert S. Gray, David Kotz, George Cybenko, and Daniela Rus. D’Agents : Security in<br />
a multiple-language, mobile-agent system. In Giovanni Vigna, editor, Mobile Agents and<br />
Security, volume 1419 of Lecture Notes in Computer Science, pages 154–187. Springer-<br />
Verlag, 1998.<br />
[59] H. Hosmer. Metapolicies II. In 15th National Computer Security Conference, pages 369–<br />
378, Baltimore, MD, October 1992.<br />
[60] Fabrice Huet. Objets Mobiles : conception d’un middleware et évaluation <strong>de</strong> la communication.<br />
PhD thesis, Université <strong>de</strong> Nice-Sophia Antipolis, 2002.<br />
[61] Mamdouh H. Ibrahim. Reflection and metalevel <strong>architecture</strong>s in object-oriented programming<br />
(workshop session). In Proceedings of the European conference on Object-oriented<br />
programming ad<strong>de</strong>ndum : systems, languages, and applications, pages 73–80. ACM Press,<br />
1991.<br />
[62] G. Karjoth, D.B. Lange, and M. Oshima. A Security Mo<strong>de</strong>l for Aglets. IEEE Internet<br />
Computing, 1(4) :68–77, 1997.<br />
[63] Neeran Karnik and Anand Tripathi. Agent Server Architecture for the Ajanta Mobile-<br />
Agent System. In Proceedings of the 1998 International Conference on Parallel and Distributed<br />
Processing Techniques and Applications (PDPTA’98), Las Vegas, 1998.<br />
[64] Neeran M. Karnik and Anand R. Tripathi. Security in the ajanta mobile agent system.<br />
Software, Practice and Experience, 31(4) :301–329, 2001.<br />
[65] N. Koblitz. Elliptic curve cryptosystems. Mathematics of Computation, 48 :203–209, 1987.<br />
[66] H. Krawczyk, M. Bellare, and R. Canetti. HMAC : Keyed-Hashing for Message Authentication,<br />
February 1997. RFC 2104.<br />
[67] Axel W. Krings, Jean-Louis Roch, Samir Jafar, and Sebastien Varrette. A probabilistic<br />
approach for task and result certification of large-scale distributed applications in hostile<br />
environments. In LNCS Springer-Verlag, editor, European Grid Conference EGC’2005,<br />
Amsterdam, The Netherlands, february 14-16 2005.<br />
[68] Butler W. Lampson. Protection. In Proceedings of the 5th Princeton Conf. on Information<br />
Sciences and Systems, Princeton, 1971. Reprinted in ACM Operating Systems Rev. 8, 1<br />
(Jan. 1974), pp 18-24.<br />
[69] Butler W. Lampson. A Note on the Confinement Problem. Communications of the ACM,<br />
16(10) :613–615, 1973.<br />
[70] J.-C. Laprie et al. Dependability : Basic Concepts and Terminology. Dependable Computing<br />
and Fault-Tolerant Systems. Springer-Verlag, Wien, New York, 1992.<br />
[71] Arjen K. Lenstra and Eric R. Verheul. Selecting Cryptographic Key Sizes. In Public Key<br />
Cryptography, pages 446–465, 2000.<br />
[72] Henry M. Levy. Capability-Based Computer Systems. Digital Press, Bedford, Massachusetts,<br />
1984.<br />
[73] Geoffrey Lewis, Steven Barber, and Ellen Siegel. Programming with Java IDL. John Wiley<br />
& Sons, 1998.<br />
[74] Mike Lewis and Andrew Grimshaw. The Core Legion Object Mo<strong>de</strong>l. In Proceedings of<br />
the Fifth IEEE International Symposium on High Performance Distributed Computing,<br />
Syracuse, New York, USA, August 1996. IEEE.<br />
[75] J. Linn. Generic Security Service Application Program Interface Version 2, Update 1, January<br />
2000. RFC 2743.<br />
6