these doctorat une architecture de securité
these doctorat une architecture de securité
these doctorat une architecture de securité
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
BIBLIOGRAPHIE<br />
tel-00239252, version 1 - 5 Feb 2008<br />
[99] A. Puliafito and O. Tomarchio. Security mechanisms for the map agent system. In 8th<br />
Euromicro Workshop on Parallel and Distributed Processing (PDP2000), Rhodos, Greece,<br />
January 2000.<br />
[100] A. Puliafito, O. Tomarchio, and L. Vita. MAP : Design and Implementation of a Mobile<br />
Agents Platform. Technical Report TR-CT-9712, 1997.<br />
[101] Ingo Rammer. Advanced .NET Remoting, C# Edition. Apress, 2005.<br />
[102] Thomas Riechmann and Franz J. Hauck. Meta objects for access control : extending<br />
capability-based security. In Proceedings of the ACM New Security Paradigms Workshop,<br />
pages 17–22, New York, NY, 1998. ACM Press.<br />
[103] Thomas Riechmann and Jurgen Kleino<strong>de</strong>r. Meta objects for access control : Role-based<br />
principals. In Australasian Conference on Information Security and Privacy, pages 296–<br />
307, 1998.<br />
[104] R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and<br />
public-key cryptosystems. Communication of the ACM, 21(2) :120–126, 1978.<br />
[105] Aviel D. Rubin and Jr. Daniel E. Geer. Mobile Co<strong>de</strong> Security. IEEE Internet Computing,<br />
2(6) :30–34, 1998.<br />
[106] Andrew S, Grimshaw, and William A. Wulf. The Legion Vision of a Worldwi<strong>de</strong> Virtual<br />
Computer. Communications of the ACM, 40(1) :39–45, January 1997.<br />
[107] Ravi Sandhu, David Ferraiolo, and Richard Kuhn. The nist mo<strong>de</strong>l for role-based access<br />
control : towards a unified standard. In Proceedings of the fifth ACM workshop on Rolebased<br />
access control, pages 47–63, Berlin, Germany, 2000. ACM Press.<br />
[108] Luis F. G. Sarmenta. Sabotage-tolerance mechanisms for volunteer computing systems. In<br />
CCGRID ’01 : Proceedings of the 1st International Symposium on Cluster Computing and<br />
the Grid, page 337, Washington, DC, USA, 2001. IEEE Computer Society.<br />
[109] Andreas Schaad, Jonathan Moffett, and Jeremy Jacob. The Role-Based Access Control<br />
System of a European Bank : a Case Study and Discussion. In SACMAT ’01 : Proceedings<br />
of the sixth ACM symposium on Access control mo<strong>de</strong>ls and technologies, pages 3–9, New<br />
York, NY, USA, 2001. ACM Press.<br />
[110] Rudiger Schollmeier. A <strong>de</strong>finition of peer-to-peer networking for the classification of peerto-peer<br />
<strong>architecture</strong>s and applications. In IEEE, editor, 2001 International Conference<br />
on Peer-to-Peer Computing (P2P2001), Department of Computer and Information Science<br />
Linko pings Universitet, Swe<strong>de</strong>n, august 2001.<br />
[111] Brian Cantwell Smith. Reflection and Semantics in Lisp. In POPL’84 : conference record of<br />
the Annual ACM symposium on Principles of Programming Languages, pages 23–35, 1984.<br />
[112] B. Clifford Neuman J. G. Steiner and J. I. Schiller. Kerberos : An authentication service for<br />
open network systems. In Winter 1988 USENIX Conference, pages 191–201, Dallas, TX,<br />
1988.<br />
[113] Sun Microsystems. Java remote method invocation specification, October 1998.<br />
ftp ://ftp.javasoft.com/docs/jdk1.2/rmi-spec-JDK1.2.pdf.<br />
[114] Sun Microsystems. Enterprise JavaBeans Specification, version 2.0. Sun Microsystems,<br />
August 2001.<br />
[115] J. Tardo and L. Valente. Mobile agent security and Telescript. In IEEE CompCon, 1996.<br />
[116] U.S. National Institute of Standards and Technology (NIST). Specification for the Advanced<br />
Encryption Standard (AES). Fe<strong>de</strong>ral Information Processing Standards Publication 197<br />
(FIPS PUB 197), November 2001.<br />
[117] Julien Vayssière. Une <strong>architecture</strong> <strong>de</strong> sécurité pour les applications réflexives, Application<br />
à Java. PhD thesis, OASIS - INRIA Sophia Antipolis, 2002.<br />
[118] Bill Venners. Un<strong>de</strong>r the hood : The <strong>architecture</strong> of aglets. JavaWorld : IDG’s magazine for<br />
the Java community, 2(4), April 1997.<br />
[119] Hal Wasserman and Manuel Blum. Software reliability via run-time result-checking. Journal<br />
of the ACM, 44(6) :826–849, 1997.<br />
8