Controlled access and dissemination of XML documents
Proceedings of the 2nd international workshop on Web information and data management
Authentication primitives and their compilation
Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
An approach to safe object sharing
OOPSLA '00 Proceedings of the 15th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
Concurrent Programming in Java. Second Edition: Design Principles and Patterns
Concurrent Programming in Java. Second Edition: Design Principles and Patterns
The JavaSeal Mobile Agent Kernel
Autonomous Agents and Multi-Agent Systems
Hi-index | 0.00 |
Security of e-applications running over Internet is a major requirement for their widespread use. As discussions in this panel often pointed it out, such kind of applications shows more and more a property of mobility: mobility of code, data, or even mobility of objects, termed agents. But how to enforce security of such mobile components? Is it at the programming language level, or could it be managed in a completely transparent way for the programmer ? Do we need domainspecific languages that we hope could be trusted or are general-purpose languages enough ? This panel gave some highlights on how adequate the object-oriented language technology could be; at which level of granularity security has to be designed and introduced into the application; why solutions differing from classical cryptography-based solutions are promising.