13.05.2014 Views

these doctorat une architecture de securité

these doctorat une architecture de securité

these doctorat une architecture de securité

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

BIBLIOGRAPHIE<br />

tel-00239252, version 1 - 5 Feb 2008<br />

[99] A. Puliafito and O. Tomarchio. Security mechanisms for the map agent system. In 8th<br />

Euromicro Workshop on Parallel and Distributed Processing (PDP2000), Rhodos, Greece,<br />

January 2000.<br />

[100] A. Puliafito, O. Tomarchio, and L. Vita. MAP : Design and Implementation of a Mobile<br />

Agents Platform. Technical Report TR-CT-9712, 1997.<br />

[101] Ingo Rammer. Advanced .NET Remoting, C# Edition. Apress, 2005.<br />

[102] Thomas Riechmann and Franz J. Hauck. Meta objects for access control : extending<br />

capability-based security. In Proceedings of the ACM New Security Paradigms Workshop,<br />

pages 17–22, New York, NY, 1998. ACM Press.<br />

[103] Thomas Riechmann and Jurgen Kleino<strong>de</strong>r. Meta objects for access control : Role-based<br />

principals. In Australasian Conference on Information Security and Privacy, pages 296–<br />

307, 1998.<br />

[104] R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and<br />

public-key cryptosystems. Communication of the ACM, 21(2) :120–126, 1978.<br />

[105] Aviel D. Rubin and Jr. Daniel E. Geer. Mobile Co<strong>de</strong> Security. IEEE Internet Computing,<br />

2(6) :30–34, 1998.<br />

[106] Andrew S, Grimshaw, and William A. Wulf. The Legion Vision of a Worldwi<strong>de</strong> Virtual<br />

Computer. Communications of the ACM, 40(1) :39–45, January 1997.<br />

[107] Ravi Sandhu, David Ferraiolo, and Richard Kuhn. The nist mo<strong>de</strong>l for role-based access<br />

control : towards a unified standard. In Proceedings of the fifth ACM workshop on Rolebased<br />

access control, pages 47–63, Berlin, Germany, 2000. ACM Press.<br />

[108] Luis F. G. Sarmenta. Sabotage-tolerance mechanisms for volunteer computing systems. In<br />

CCGRID ’01 : Proceedings of the 1st International Symposium on Cluster Computing and<br />

the Grid, page 337, Washington, DC, USA, 2001. IEEE Computer Society.<br />

[109] Andreas Schaad, Jonathan Moffett, and Jeremy Jacob. The Role-Based Access Control<br />

System of a European Bank : a Case Study and Discussion. In SACMAT ’01 : Proceedings<br />

of the sixth ACM symposium on Access control mo<strong>de</strong>ls and technologies, pages 3–9, New<br />

York, NY, USA, 2001. ACM Press.<br />

[110] Rudiger Schollmeier. A <strong>de</strong>finition of peer-to-peer networking for the classification of peerto-peer<br />

<strong>architecture</strong>s and applications. In IEEE, editor, 2001 International Conference<br />

on Peer-to-Peer Computing (P2P2001), Department of Computer and Information Science<br />

Linko pings Universitet, Swe<strong>de</strong>n, august 2001.<br />

[111] Brian Cantwell Smith. Reflection and Semantics in Lisp. In POPL’84 : conference record of<br />

the Annual ACM symposium on Principles of Programming Languages, pages 23–35, 1984.<br />

[112] B. Clifford Neuman J. G. Steiner and J. I. Schiller. Kerberos : An authentication service for<br />

open network systems. In Winter 1988 USENIX Conference, pages 191–201, Dallas, TX,<br />

1988.<br />

[113] Sun Microsystems. Java remote method invocation specification, October 1998.<br />

ftp ://ftp.javasoft.com/docs/jdk1.2/rmi-spec-JDK1.2.pdf.<br />

[114] Sun Microsystems. Enterprise JavaBeans Specification, version 2.0. Sun Microsystems,<br />

August 2001.<br />

[115] J. Tardo and L. Valente. Mobile agent security and Telescript. In IEEE CompCon, 1996.<br />

[116] U.S. National Institute of Standards and Technology (NIST). Specification for the Advanced<br />

Encryption Standard (AES). Fe<strong>de</strong>ral Information Processing Standards Publication 197<br />

(FIPS PUB 197), November 2001.<br />

[117] Julien Vayssière. Une <strong>architecture</strong> <strong>de</strong> sécurité pour les applications réflexives, Application<br />

à Java. PhD thesis, OASIS - INRIA Sophia Antipolis, 2002.<br />

[118] Bill Venners. Un<strong>de</strong>r the hood : The <strong>architecture</strong> of aglets. JavaWorld : IDG’s magazine for<br />

the Java community, 2(4), April 1997.<br />

[119] Hal Wasserman and Manuel Blum. Software reliability via run-time result-checking. Journal<br />

of the ACM, 44(6) :826–849, 1997.<br />

8

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!