A language with distributed scope
POPL '95 Proceedings of the 22nd ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Instant CORBA
Using encryption for authentication in large networks of computers
Communications of the ACM
Distributed Operating Systems: Concepts and Design
Distributed Operating Systems: Concepts and Design
Distributed Operating Systems and Algorithms
Distributed Operating Systems and Algorithms
Distributed Systems: Concepts and Design
Distributed Systems: Concepts and Design
Reflective Authorization Systems
ECOOP '98 Workshop ion on Object-Oriented Technology
Security and Communication in Mobile Object Systems
MOS '96 Selected Presentations and Invited Papers Second International Workshop on Mobile Object Systems - Towards the Programmable Internet
Analyzing Mobile Code Languages
MOS '96 Selected Presentations and Invited Papers Second International Workshop on Mobile Object Systems - Towards the Programmable Internet
Secure Implementation of Channel Abstractions
LICS '98 Proceedings of the 13th Annual IEEE Symposium on Logic in Computer Science
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
USITS'97 Proceedings of the USENIX Symposium on Internet Technologies and Systems on USENIX Symposium on Internet Technologies and Systems
Jonathan: an open distributed processing environment in Java
Middleware '98 Proceedings of the IFIP International Conference on Distributed Systems Platforms and Open Distributed Processing
Dual-Mode Execution Environment for active network
Journal of Systems Architecture: the EUROMICRO Journal
Hi-index | 0.00 |
We present some issues relevant to the design of a secure platform for distributed mobile computing, that goes beyond existing ad-hoc approaches to software mobility. This platform aims to support wide-area computing applications such as active network infrastructures or network supervision tools. Our contribution is two-fold: the first part of the paper is a survey of the security features of a few languages and virtual machines as regards authentication, access control, and communications security. We then discuss a possible architecture for a secure virtual machine for distributed mobile computing based on interesting features found in the implementations studied.