We describe the design and implementation of a security in-frastructure for a distributed Java application. This work is inspired by SDSI/SPKI, but has a few twists of its own. We define a logic for access control, such that access is granted iff a proof that it should be granted is derivable in the logic. Our logic supports linked local name spaces, privilege del-egation across administrative domains, and attribute cer-tificates. We use SSL to establish secure channels through which principals can “speak”, and have implemented our access control system in Java. While we implemented our infrastructure for the Placeless Documents System, our de-sign is applicable to other applications as well. We discuss general issues related to building se...
. The Java security architecture in the Java Development Kit 1.2 expands the current Java sandbox mo...
Many secure applications are emerging using the Java TM language and running on the Java platform....
JAVASEAL extends the JAVA programming environment with a model of mobile "agents" and strong hierarc...
We present a platform for distributed computation that employs Java RMI as the underlying communicat...
Both Java RMI and Jini use a proxy-based architecture. In this architecture, a client interacts with...
Today’s distributed e-commerce applications typically rely upon various technologies in their realiz...
Abstract. The architecture and integration of distributed applications increased in complexity over ...
There are many technologies for distributed processing/interoperation, including CORBA, DCE, DCOM, E...
Abstract. The Java security architecture in the Java Development Kit 1.2 expands the current Java sa...
The use of the internet has exploded with many more context aware applications for different service...
Web application programmers tend to focus on services when developing networking applications. Numer...
Nowadays we have very large distributed, partially untrusted systems distributed on the internet. As...
What is the best way to build programs that compute with data sources controlled by multiple princip...
SDM is a Secure Delegation Model for Java-based distributed object environments. SDM extends current...
This thesis describes the design, development and implementation of a three-tiered (client/server/d...
. The Java security architecture in the Java Development Kit 1.2 expands the current Java sandbox mo...
Many secure applications are emerging using the Java TM language and running on the Java platform....
JAVASEAL extends the JAVA programming environment with a model of mobile "agents" and strong hierarc...
We present a platform for distributed computation that employs Java RMI as the underlying communicat...
Both Java RMI and Jini use a proxy-based architecture. In this architecture, a client interacts with...
Today’s distributed e-commerce applications typically rely upon various technologies in their realiz...
Abstract. The architecture and integration of distributed applications increased in complexity over ...
There are many technologies for distributed processing/interoperation, including CORBA, DCE, DCOM, E...
Abstract. The Java security architecture in the Java Development Kit 1.2 expands the current Java sa...
The use of the internet has exploded with many more context aware applications for different service...
Web application programmers tend to focus on services when developing networking applications. Numer...
Nowadays we have very large distributed, partially untrusted systems distributed on the internet. As...
What is the best way to build programs that compute with data sources controlled by multiple princip...
SDM is a Secure Delegation Model for Java-based distributed object environments. SDM extends current...
This thesis describes the design, development and implementation of a three-tiered (client/server/d...
. The Java security architecture in the Java Development Kit 1.2 expands the current Java sandbox mo...
Many secure applications are emerging using the Java TM language and running on the Java platform....
JAVASEAL extends the JAVA programming environment with a model of mobile "agents" and strong hierarc...