13.05.2014 Views

these doctorat une architecture de securité

these doctorat une architecture de securité

these doctorat une architecture de securité

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

BIBLIOGRAPHIE<br />

tel-00239252, version 1 - 5 Feb 2008<br />

[76] Torsten Lod<strong>de</strong>rstedt, David A. Basin, and Jürgen Doser. SecureUML : A UML-Based Mo<strong>de</strong>ling<br />

Language for Mo<strong>de</strong>l-Driven Security. In UML ’02 : Proceedings of the 5th International<br />

Conference on The Unified Mo<strong>de</strong>ling Language, pages 426–441, London, UK, 2002.<br />

Springer-Verlag.<br />

[77] Sergio Loureiro, Refik Molva, and Yves Roudier. Mobile Co<strong>de</strong> Security. In Proceedings of<br />

ISYPAR 2000, Toulouse, France, 2000.<br />

[78] Pattie Maes. Computational Reflection. PhD thesis, Vrije Universiteit Brussel, March<br />

1987.<br />

[79] Mitsuru Matsui. Linear cryptanalysis method for DES cipher. In T. Helleseth, editor,<br />

Advances in Cryptology — Eurocrypt ’93, volume 765 of Lecture Notes in Computer Science,<br />

pages 386–397, Berlin, 1994. Springer-Verlag.<br />

[80] Andrew J. Maywah. An Implementation of a Secure Web Client Using SPKI/SDSI Certificates.<br />

Master’s thesis, Massachusetts Institute of Technology, May 1999.<br />

[81] Daryl McCullough. A Hookup Theorem for Multilevel Security. IEEE Transactions on<br />

Software Engineering, 16(6) :563–568, 1990.<br />

[82] Paul L. McCullough. Transparent forwarding : First steps. In Conference proceedings on<br />

Object-oriented programming systems, languages and applications, pages 331–341. ACM<br />

Press, 1987.<br />

[83] Gary McGraw and Edward W. Felten. Securing Java : Getting Down to Business with<br />

Mobile Co<strong>de</strong>, 2nd Edition. Wiley, 1999.<br />

[84] J. McLean. The Algebra of Security. In Proceedings of the IEEE Symposium on Security<br />

and Privacy, pages 2–7, Oakland, CA, USA, April 1988.<br />

[85] John McLean. A General Theory of Composition for a Class of “Possibilistic” Properties.<br />

IEEE Transactions on Software Engineering, 22(1) :53–67, 1996.<br />

[86] Ralph C. Merkle. Secure communications over insecure channels. Communications of<br />

ACM, 21(4) :294–299, 1978.<br />

[87] Sun Microsystems. Java Authentication and Authorization Service (JAAS).<br />

[88] Kevin D. Mitnick and William L. Simon. The Art Of Intrusion : The Real Stories Behind<br />

The Exploits Of Hackers, Intru<strong>de</strong>rs, & Deceivers. Hardcover, 2005.<br />

[89] Richard MonsonHaefel, Bill Burke, and Sacha Labourey. Enterprise JavaBeans, 4th Edition.<br />

O’Reilly & Associates, 2004.<br />

[90] Alexan<strong>de</strong>r Morcos. A Java implementation of Simple Distributed Security Infrastructure.<br />

Master’s thesis, Massachusetts Institute of Technology, May 1998.<br />

[91] Anand Natrajan, Anh Nguyen-Tuong, and Andrew Grimshaw Marty Humphrey. The Legion<br />

Grid Portal. In Grid Computings - Grid 2001, volume 2242 of Lecture Notes in Computer<br />

Science, Denver, Colorado, 2001, November 2001. ACM, IEEE, Springer-Verlag, Hei<strong>de</strong>lberg,<br />

Germany.<br />

[92] B. Clifford Neuman. Proxy-based authorization and accounting for distributed systems. In<br />

International Conference on Distributed Computing Systems, pages 283–291, 1993.<br />

[93] nQueens n = 25 solved with ObjectWeb ProActive. http ://www.inria.fr/oasis/ProActive/nqueens25.html.<br />

[94] National Bureau of Standards. Data encryption standard. Fe<strong>de</strong>ral Information Processing<br />

Standards Publication, 46, 1977.<br />

[95] Alexandre Oliva and Luiz Eduardo Buzato. Designing a secure and reconfigurable metaobject<br />

protocol. Technical Report IC-99-08, University of Campinas, Brésil, February 1999.<br />

[96] Object group management. http ://www.omg.org, 2004.<br />

[97] OSGi Web Site. http ://www.osgi.org, 2005.<br />

[98] Geoffrey A. Pascoe. Encapsulators : A new software paradigm in smalltalk-80. In Proceedings<br />

of OOPSLA’86, pages 341–346, 1986.<br />

7

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!