Abstract
Security of e-applications running over Internet is a major requirement for their widespread use. As discussions in this panel often pointed it out, such kind of applications shows more and more a property of mobility: mobility of code, data, or even mobility of objects, termed agents. But how to enforce security of such mobile components ? Is it at the programming language level, or could it be managed in a completely transparent way for the programmer ? Do we need domain-specific languages that we hope could be trusted or are general-purpose languages enough ? This panel gave some highlights on how adequate the object-oriented language technology could be; at which level of granularity security has to be designed and introduced into the application; why solutions differing from classical cryptography-based solutions are promising.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
S. Loureiro, R. Molva. Privacy for mobile code. Proceedings of distributed object security workshop, OOPSLA’99, Denver, November 1999.
S. Loureiro, R. Molva, A. Pannetrat. Secure data collection with updates. Proceedings of Workshop on Agent Electronic Commerce, First Asia Pacific Conference on Intelligent Agent Technology, Yimming Yee and Jiming Liu editors, 121–130, Hong-Kong, December 1999.
S. Loureiro, R. Molva. Mobile Code Protection with Smartcards. Proceedings of ECOOP 2000 workshop on Mobile Object Systems, Sophia Antipolis, France, June 13th, 2000
E. Bertino, S. Castano, E. Ferrari, M. Mesiti. Specifying and Enforcing Access Control Policies for XML Document Sources. World Wide Web Journal, Baltzer Science Publishers, 3(3), in press.
E. Bertino, S. Castano, E. Ferrari, M. Mesiti. Controlled Access and Distribution of XML Documents. In Proc. 2nd ACM Workshop on Web Information and Data Management (WIDM’99), Kansas City (Missouri), November 1999. ACM Press.
C. Bryce, C. Razafimahefa, An Approach to Safe Object Sharing, in OOPSLA 2000.
C. Bryce, J. Vitek, The JavaSeal Mobile Agent Kernel, to appear in Autonomous Agents and Multi-Agent Systems Journal
Doug Lea. Concurrent Programming in Java: Design principles and patterns, Addison-Wesley. Second edition, November 1999.
M. Abadi, C. Fournet, G. Gonthier. Authentication Primitives and their Compilation. Proceedings of the 27th ACM Symposium on Principles of Programming Languages (POPL’00), 302–315. January 2000.
M. Abadi, C. Fournet, G. Gonthier. Secure Communications Processing for Distributed Languages. Proceedings of the 1999 IEEE Symposium on Security and Privacy (S&P’99), 74–88. May 1999.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Molva, R., Baude, F. (2000). Panel Session: Mobile Code, Internet Security, and E-Commerce. In: Goos, G., Hartmanis, J., van Leeuwen, J., Malenfant, J., Moisan, S., Moreira, A. (eds) Object-Oriented Technology. ECOOP 2000. Lecture Notes in Computer Science, vol 1964. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44555-2_19
Download citation
DOI: https://doi.org/10.1007/3-540-44555-2_19
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-41513-8
Online ISBN: 978-3-540-44555-5
eBook Packages: Springer Book Archive