these doctorat une architecture de securité
these doctorat une architecture de securité
these doctorat une architecture de securité
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
BIBLIOGRAPHIE<br />
tel-00239252, version 1 - 5 Feb 2008<br />
[76] Torsten Lod<strong>de</strong>rstedt, David A. Basin, and Jürgen Doser. SecureUML : A UML-Based Mo<strong>de</strong>ling<br />
Language for Mo<strong>de</strong>l-Driven Security. In UML ’02 : Proceedings of the 5th International<br />
Conference on The Unified Mo<strong>de</strong>ling Language, pages 426–441, London, UK, 2002.<br />
Springer-Verlag.<br />
[77] Sergio Loureiro, Refik Molva, and Yves Roudier. Mobile Co<strong>de</strong> Security. In Proceedings of<br />
ISYPAR 2000, Toulouse, France, 2000.<br />
[78] Pattie Maes. Computational Reflection. PhD thesis, Vrije Universiteit Brussel, March<br />
1987.<br />
[79] Mitsuru Matsui. Linear cryptanalysis method for DES cipher. In T. Helleseth, editor,<br />
Advances in Cryptology — Eurocrypt ’93, volume 765 of Lecture Notes in Computer Science,<br />
pages 386–397, Berlin, 1994. Springer-Verlag.<br />
[80] Andrew J. Maywah. An Implementation of a Secure Web Client Using SPKI/SDSI Certificates.<br />
Master’s thesis, Massachusetts Institute of Technology, May 1999.<br />
[81] Daryl McCullough. A Hookup Theorem for Multilevel Security. IEEE Transactions on<br />
Software Engineering, 16(6) :563–568, 1990.<br />
[82] Paul L. McCullough. Transparent forwarding : First steps. In Conference proceedings on<br />
Object-oriented programming systems, languages and applications, pages 331–341. ACM<br />
Press, 1987.<br />
[83] Gary McGraw and Edward W. Felten. Securing Java : Getting Down to Business with<br />
Mobile Co<strong>de</strong>, 2nd Edition. Wiley, 1999.<br />
[84] J. McLean. The Algebra of Security. In Proceedings of the IEEE Symposium on Security<br />
and Privacy, pages 2–7, Oakland, CA, USA, April 1988.<br />
[85] John McLean. A General Theory of Composition for a Class of “Possibilistic” Properties.<br />
IEEE Transactions on Software Engineering, 22(1) :53–67, 1996.<br />
[86] Ralph C. Merkle. Secure communications over insecure channels. Communications of<br />
ACM, 21(4) :294–299, 1978.<br />
[87] Sun Microsystems. Java Authentication and Authorization Service (JAAS).<br />
[88] Kevin D. Mitnick and William L. Simon. The Art Of Intrusion : The Real Stories Behind<br />
The Exploits Of Hackers, Intru<strong>de</strong>rs, & Deceivers. Hardcover, 2005.<br />
[89] Richard MonsonHaefel, Bill Burke, and Sacha Labourey. Enterprise JavaBeans, 4th Edition.<br />
O’Reilly & Associates, 2004.<br />
[90] Alexan<strong>de</strong>r Morcos. A Java implementation of Simple Distributed Security Infrastructure.<br />
Master’s thesis, Massachusetts Institute of Technology, May 1998.<br />
[91] Anand Natrajan, Anh Nguyen-Tuong, and Andrew Grimshaw Marty Humphrey. The Legion<br />
Grid Portal. In Grid Computings - Grid 2001, volume 2242 of Lecture Notes in Computer<br />
Science, Denver, Colorado, 2001, November 2001. ACM, IEEE, Springer-Verlag, Hei<strong>de</strong>lberg,<br />
Germany.<br />
[92] B. Clifford Neuman. Proxy-based authorization and accounting for distributed systems. In<br />
International Conference on Distributed Computing Systems, pages 283–291, 1993.<br />
[93] nQueens n = 25 solved with ObjectWeb ProActive. http ://www.inria.fr/oasis/ProActive/nqueens25.html.<br />
[94] National Bureau of Standards. Data encryption standard. Fe<strong>de</strong>ral Information Processing<br />
Standards Publication, 46, 1977.<br />
[95] Alexandre Oliva and Luiz Eduardo Buzato. Designing a secure and reconfigurable metaobject<br />
protocol. Technical Report IC-99-08, University of Campinas, Brésil, February 1999.<br />
[96] Object group management. http ://www.omg.org, 2004.<br />
[97] OSGi Web Site. http ://www.osgi.org, 2005.<br />
[98] Geoffrey A. Pascoe. Encapsulators : A new software paradigm in smalltalk-80. In Proceedings<br />
of OOPSLA’86, pages 341–346, 1986.<br />
7