The internet worm program: an analysis
ACM SIGCOMM Computer Communication Review
Systems programming with Modula-3
Systems programming with Modula-3
Introduction to OSF DCE (rev. 1.0)
Introduction to OSF DCE (rev. 1.0)
Authentication in distributed systems: theory and practice
ACM Transactions on Computer Systems (TOCS)
Authentication in the Taos operating system
ACM Transactions on Computer Systems (TOCS) - Special issue on operating systems principles
Extensible access control for a hierarchy of servers
ACM SIGOPS Operating Systems Review
Software—Practice & Experience - Special issue on object-oriented programming and technology
Distributed systems (2nd Ed.)
A note on the confinement problem
Communications of the ACM
Programming semantics for multiprogrammed computations
Communications of the ACM
KryptoKnight Authentication and Key Distribution System
ESORICS '92 Proceedings of the Second European Symposium on Research in Computer Security
ACM SIGOPS Operating Systems Review
Integrating security in CORBA based object architectures
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
AnBx: security protocols design and verification
ARSPA-WITS'10 Proceedings of the 2010 joint conference on Automated reasoning for security protocol analysis and issues in the theory of security
Hi-index | 0.00 |
We describe the design and implementation of secure network objects, which provide security for object-oriented network communication. The design takes advantage of objects and subtyping to present a simple but expressive programming interface for security, supporting both access control lists and capabilities. The implementation of this design fits nicely within the structure of the existing network objects system; we discuss its internal components, its performance, and its use in some applications.