| Kiczales, “Going Beyond Objects for Better Separation of Concerns in Design and Implementation,” Aspect-Oriented-Programming, 1997, 1998. |
| Lopes et al., “Proceedings of the Aspect-Oriented Programming Workshop at ECOOP '98,” 1998. |
| Lopes et al., “Proceedings of the Apect-Oriented Programming Workshop at ECOOP '97,” 1997. |
| “Using Secure RPC,” MSDN Library CD, pp. 1-7, Apr. 1998. |
| Brown et al., “Distributed Component Object Model Protocol—DCOM/1.0,” http://globecom.net/ietf/draft/draft-brown-dcom-v1-spec-03.html, pp. 1-52, Jan. 1998. |
| U.S. application Ser. No. 09/071,594, Fox et al., filed May 1, 1998. |
| “Implementing locale as dynamically loaded shared object files,” IBM Technical Disclosure Bulletin, US, IBM Corporation, New York, vol. 34, No. 12, pp. 117-118 (1992). |
| Jonathan D. Moffett. Specification of Management Policies and Discretionary Access Control. In M. S. Sloman, editor, Network and Distributed Systems Management, chapter 18, pp. 18-1 through 18-21. Addison-Wesley, 1994. |
| Sloman, M., and J. Moffett. “Managing Distributed Systems”, Domino Project Report , Imperial College, U.K. Sep. 1989 (pp. 1-23). |
| G. Wiederhold: Mediators in the Architecture of Future Information Systems. IEEE Computer, 25(3), 1992 (36 pages). |
| M. S. Sloman, Policy Driven Management for Distributed Systems. Journal of Network and Systems Management, 2(4): 333-360, Plenum Press Publishing, 1994 (22 pages in downloaded format). |
| Jonathan D. Moffett, Morris S. Sloman. Policy Hierarchies for Distributed Systems Management. IEEE Journal on Selected Areas in Communications, Special Issue on Network Management, 11(9):1404-1414, Dec. 1993 (22 pages in downloaded format). |
| Scott A. Gile. Reporting Application Usage in a LAN Environment, New Centerings in Computing Services, pp. 147-159 (1990). |
| Moffett J.D. & Sloman, M.S. (1991b), The Representation of Policies as System Objects, Proceedings of the Conference on Organisational Computer Systems (COCS'91) Atlanta, GA, Nov. 5-8, 1991, in SIGOIS Bulletin vol. 12, Nos. 2 & 3, pp 171-184 (16 pages in downloaded format). |
| Brockschmidt, “Chapter 6 Local/Remote Transparency,” Inside Ole, 2d Ed., pp. 277-338 (1995). |
| Lam, “Building Scalable Apps,” PC Tech Magazine, pp. 209-214 (Apr. 1998). |
| Microsoft, Windows NT® Server, Server Operating System White Paper, “DCOM Technical Overview,” pp. 43 (Apr. 1998). |
| Orfali et al., [“COM:OLE's Object Bus”], The Essential Distributed Objects Survival Guide, Ch. 25, pp. 429-452 (© 1996). |
| Orfali et al., “CORBA Services: System Management and Security,” The Essential Distributed Objects Survival Guide, Ch. 10, pp. 183-202 (1996). |
| Tomsen, “Virtually Crash-Proof your Web site with IIS 4.0,” Microsoft Interactive Developer, 2:10, pp. 41-46 (Oct. 1997). |
| Orfali et al., Ch. 9, “RPC, Messaging, and Peer-to-Peer,” Essential Client/Server Survival Guide, John Wiley & Sons, Inc., pp. 119-128 (1994). |
| “Chapter 9: Connectable Objects,” Footnotes, pp. 1-12, http://www.microsoft.com/oledev/olecom/Ch09.htm. |
| Hackathorn, “Solutions to overworked networks and unruly software distribution are just part of P&S,” BYTE Magazine, pp. 1-15 (Sep. 1997). |
| Hamilton (Ed.), “JavaBeans™,” Sun Microsystems, Version 1.01, pp. 1-114. (Jul. 1997). |
| Horstmann et al., “DCOM Architecture,” DCOM Architecture, Microsoft Press, pp. 1-55 (Apr. 1998). |
| Hurwicz, “Multicast to the Masses: The IP multicast standard is ready, but the infrastructure isn't. Yet . . . ” BYTE Magazine, pp. 1-10 (Jun. 1997). |
| Hackathorn, “When information links change constantly, Publish and Subscribe promises robust data deliver” BYTE Magazine, pp. 1-8 (Jun. 1997). |
| Loshin, “Pull out the old and push in the new with reliable and scalable P&S middleware,” BYTE Magazine, pp. 1-11 (Feb. 1998). |
| Managing Performance/Reliability Trade-Offs, BYTE Magazine, Review, pp. 1-2 (Feb. 1998). |
| “Monkey in the Middleware,” BYTE Magazine, Reviews, pp. 1-2 (Feb. 1998). |
| Montgomery, “Distributing Components: For CORBA and DCOM it's time to get practical,” BYTE Magazine, Special Report, pp. 1-10 and illustrations “DCOM Architecture” and “CORBA Architecture” (Apr. 1997). |
| Skeen, “Enabling the Real-Time Enterprise,” BYTE Magazine, Core Technologies, pp. 1-5 and illustrations “Reliable Multicast Protocol in Action” and “Multilevel Caching Over a WAN” (Jan. 1998). |
| Matena et al., “Enterprise JavaBeans™,” Version 1.0 Specification, Sun Microsystems, pp. 1-181 (Mar. 21, 1998). |
| “The Component Object Model: Technical Overview,” Microsoft Corporation, pp. 1-17. |
| Seetharaman, “The CORBA Connection,” Communications of the ACM, 41:10, pp. 34-36 (Oct. 1998). |
| Siegel, “OMG Overview: CORBA and the OMA in Enterprise Computing,” Communications of the ACM, 41:10, pp. 37-43 (Oct. 1998). |
| Vinoski, “New features for CORBA 3.0,” Communications of the ACM, 41:10, pp. 44-52 (Oct. 1998). |
| Schmidt, “Evaluating Architectures for Multithreaded Object Request Brokers,” Communications of the ACM, 41:10, pp. 54-60 (Oct. 1998). |
| Henning, “Binding, Migration, and Scalability in CORBA,” Communications of the ACM, 41:10, pp. 62-71 (Oct. 1998). |
| Haggerty et al., “The Benefits of CORBA-Based Network Management,” Communications of the ACM, 41:10, pp. 73-79 (Oct. 1998). |
| Grimes, Chapter 7: Security, DCOM Programming: A guide to creating practical applications with Microsoft's Distributed Component Object Model, pp. 319-389 (1997). |
| Schwartz et al., “Intel's middleware move: company ponders initiatives for common object services,” Info World 20:9, p. 1-2., (Mar. 2, 1998). |
| Sessions, COM and DCOM:Microsoft's Vision for Distributed Objects, Chapter 6, Sharing and Scalability, pp. 249-313. |
| Sessions, COM and DCOM: Microsoft's Vision for Distributed Objects, Chapter 10, “Clustering,” pp. 413-442, 1998. |
| “Remote Method Invocation Specification,” http://java.sun.com/products/jdk/1.1/docs/guide/rmi/spec/rmiTOC.doc.html, pp. 1-2 1997. |
| “Introduction,” http://java.sun.com/products/jdk/1.1/docs/guide/rmi/spec/rmi-intro.doc.html, pp. 1-2, 1997. |
| “Java Distributed Object Model,” http://java.sun.com/products/jdk/1.1/docs/guide/rmi/spec/rmi-objmodel.doc.html, pp. 1-7, 1997. |
| “System Architecture,” http://java.sun.com/products/jdk/1.1/docs/guide/rmi/spec/rmi-arch.doc.html, pp. 1-12, 1997. |
| “Client Interfaces,” http://java.sun.com/products/jdk/1.1/docs/guide/rmi/spec/rmi-client.doc.html, pp. 1-3, 1997. |
| “Server Interfaces,” http://java.sun.com/products/jdk/1.1/docs/guide/rmi/spec/rmi-server.doc.html, pp. 1-10, 1997. |
| “Registry Interfaces,” http://java.sun.com/products/jdk/1.1/docs/guide/rmi/spec/rmi-registry.doc.html, pp. 1-3, 1997. |
| “Stub/Skeleton Interfaces,” http://java.sun.com/products/jdk/1.1/docs/guide/rmi/spec/rmi-stubs.doc.html, pp. 1-4, 1997. |
| “Garbage Collector Interfaces,” http://java.sun.com/products/jdk/1.1/docs/guide/rmi/spec/rmi-dgc.doc.html, pp. 1-5, 1997. |
| “RMI Wire Protocol,” http://java.sun.com/products/jdk/1.1/docs/guide/rmi/spec/rmi-protocol.doc.html, pp. 1-9, 1997. |
| “Exceptions in RMI,” http://java.sun.com/products/jdk/1.1/docs/guide/rmi/spec/rmi-exceptions.doc.html, pp. 1-3, 1997. |
| “Properties in RMI,” http://java.sun.com/products/jdk/1.1/docs/guide/rmi/spec/rmi-properties.doc.html, p. 1, 1997. |
| Barkley, “Role Based Access Control (RBAC),” Software Diagnostics and Conformance Testing, National Institute of Standards and Technology, pp. 1-27, Mar. 1998. |
| Gavrila and Barkley, “Formal Specification for Role Based Access Control User/Role and Role/Role Relationship Management,” pp. 1-10, Oct. 1998. |
| Cugini and Ferraiolo, “Role Based Access Control Slide Set—May 1995,” National Institute of Standards and Technology, pp. 1-25, May 1995. |
| Ferraiolo and Barkley, “Specifying and Managing Role-Based Access Control within a Corporate Intranet,” pp. 1-6, 1997. |
| Ferraiolo and Kuhn, “Role-Based Access Control,” Reprinted from Proceedings of 15th National Computer Security Conference, pp. 1-11, 1992. |
| Jajodia, “Database Security and Privacy,” The Computer Science and Engineering Handbook, Tucker (ed.), CRC Press, Inc., pp. 1112-1124, Dec. 1996. |
| Orfali, Harkey, Edwards, “Client/Server Transaction Processing,” Essential Client/Server Survival Guide, pp. 241-288, 1994. |
| Adams et al., C++ An Introduction to Computing, pp. 860-869, 1995. |
| Brockschmidt, “Custom Components and the Component Object Model,” Inside OLE, 2nd Edition, pp. 219-276, 1995. |
| Brockschmidt, “In-Place Activation (Visual Editing™) and In-Place Containers,” Inside OLE, 2nd Edition, pp. 1011-1063, 1995. |
| Sandhu, “Authentication, Access Control, and Intrusion Detection,” The Computer Science and Engineering Handbook, Tucker (ed.), CRC Press, Inc., pp. 1929-1948, Dec. 1996. |
| “CORBA Overview,” The Common Object Request Broker: Architecture and Specification, Version 2.0, pp. 2-1 through 2-17, Jul. 1995. |
| The Common Object Request Broker: Architecture and Specification, Version 2.0, pp. 4-12 through 4-16, Jul. 1995. |
| Thacker et al., Firefly: A Multiprocessor Workstation, Digital, pp. 1-18, Dec. 30, 1987. |
| Schroeder et al., Performance of Firefly RPC, Digital Equipment Corporation, pp. 1-15, Apr. 15, 1989. |
| “Balance on the Back End,” InfoWorld, pp. 72-75, 78, 80, 82-83, and 86, Mar. 23, 1998. |
| Baker, “Network Management in the Enterprise,” Performance Computing, vol. 17, No. 6, pp. 23-24, 26, 28-30, and 32-34, Jun. 1999. |
| Bower, “Intel's Middleware Move,” InfoWorld, vol. 20, No. 9, pp. 1-2, 1998. |
| Davis, “Inside IBM's System View,” Datamation, vol. 37, No. 4, pp. 62-65, Feb. 15, 1991. |
| Landwehr, “Protection (Security) Models and Policy,” The Computer Science and Engineering Handbook, Tucker (ed.), CRC Press, Inc. pp. 1914-1928, Dec. 1996. |
| Nance, “Balance the Load with Transaction Server,” BYTE Magazine, http://www.byte.com/art/9706/sec6/art1.htm, pp. 1-8, Sep. 1, 1998. |
| Bochenski, IBM's SystemView, Computer Technology Research Corporation, 1st Edition, pp. 1-143, Jul. 1991. |
| Brockschmidt, “An Overview of OLE,” Inside OLE, 2nd Edition, pp. 3-60, 1995. |
| Brockschmidt, Inside OLE, 2nd Edition, pp. 248-251, 1995. |
| Cornell et al., “Objects and Classes,” Core Java, Sun Microsystems, Inc., pp. 93-139, 1997. |
| Deitel et al., “Classes and Data Abstraction,” C++ How to Program, Prentice Hall, pp. 344-356, 1994. |
| Horstmann et al., DCOM Architecture, pp. 1-51, Jul. 23, 1997. |
| “Java Remote Method Invocation—Distributed Computing for Java,” http://java.sun.com/marketing/collateral/javarmi.html, pp. 1-19, Jun. 24, 1998. |
| “Java Remote Method Invocation,” http://java.sun.com/products/jdk/1.2/docs/guide/rmi/spec/rmiTOC.doc.html, 154 pp. Dec. 1997. |
| U.S. application Ser. No. 08/959,139, Limprecht et al., filed Oct. 28, 1997. |
| U.S. application Ser. No. 08/959,149, Helland et al., filed Oct. 28, 1997. |
| “Active Objects in Hybrid,” Proceedings of OOPSLA 1987, by O.M. Nierstrasz, pp. 243-253, Oct. 4-8 (1987). |
| “Implementing Locale As Dynamically Loaded Shared Object Files”, IBM Technical Disclosure Bulletin, US, IBM Corp., New York, vol. 34, No. 12, pps. 117-118 (1992). |
| R. Limprecht, “Microsoft Transaction Server”, IEEE, pp. 14-18 (Feb. 1997). |
| G. Eddon, “COM+: The Evolution of Component Services”, IEEE on Computer, pp. 104-106 (Jul. 1999). |
| Object Transaction Services, OMG document 94.6.1 (Jun. 1994). |
| (No author given) “Transaction Context Objects in Microsoft Transaction Server”, MSDN, pp (2) (Jun. 1997). |
| D. Chappell, “The Microsoft Transaction Server (MTS)—Transactions Meet Components”, white paper, Microsoft.com (Jun. 1997). |
| “Implementing Locale As Dynamically Loaded Shared Object Files”, IBM Technical Disclosure Bulletin, US, IBM Corp., New York, vol. 34, No. 12, pps. 117-118 XP000308454 ISSN: 0018-8689—the whole document. |
| Tripathi, A.R. et al.: Design Of A Remote Procedure Call System For Object-Oriented Distributed Programming, Software Practice & Experience, GB, John Wiley & Sons Ltd., Chichester, vol. 28, No. 1, pp. 23-47 XP000723715, ISSN: 0038-0644—the whole document. |
| Tucker (editor, “The Computer Science and Engineering Handbook,” chapter 49, pp. 1112-1124 and chapter 91, pp. 1929-1948 (Dec. 1996). |