Tanenbaum, et al., "Experiences with the AMOEBA Distributed Operating System," Communications of the ACM, Dec. 1990, vol. 33, No. 12, pp. 46-63. |
Gritzalis S et al: "Security Issues Surrounding Programming Languages for Mobile Code: JAVA rm vs. Safe-Tcl" Operating Systems Review vol. 32, No. 2, Apr. 1, 1998 (1998-04-01), pp. 16-32, XPOOO766954 p. 19, left-hand column, paragraph 1; p. 22, left-hand column, paragraph 4; p. 26, right-hand column, paragraph 2; p. 28 left-hand column, paragraph 1, right-hand column, paragraph 2. |
Wallach D S et al: "Extensible security architectures for Java " Proceedings of the ACM Symposium on operating systems principles, 1997, pp. 1-26 14, XP002101681 p. 5, line 7--P. 7, line 11; p. 8, line 9-p. 10, line 13; p. 14, line 1-line 14. |
N. Islam et al: "A Flexible Security Model for Using Internet Content" IBM: Developer: Java overview: Library papers, Online! Oct. 1997, (1997-10), XP002115800. IBM Thomas J. Watson Research Center Retrieved from the Internet: URL:http//www.software.ibm.com/developer/library/flexsecurity/ retrieved on Sep. 17, 1999 p. 4 introduction; figure 2; p. 7, paragraph on Java Implementation. |
Blaze M et al: Decentralized Trust Management Proceedings of the 1996 IEEE Symposium on Security and Privacy, Oakland, CA May 6-8, 1996. No. SYMP. 17, May 6, 1996 pp. 164-173, XP000634842 Institute of Electrical and Electronics Engineers ISBN: 0-7803-3527-9. |
Riechmann, Thomas "<eta Objects for Access Control: Extending Capability-Based Security" 1997 New Security Paradigms Workshop, ACM 1998, pp. 17-22. |
Goldstein, Theodore. "The gateway Security Model in the Jaca Cemmercial Client" Sun Microsystems White Paper 1988, pp1-14. |
Korba, Larry "Towards Secure Agent Distribution and Communication" Proceedings of the 32nd HAwaii International Conference on Systems Sciences, Canadian Crown 1999 pp 1-10. |
Westphall, Carla. "Authorization Schemes for LArge-Scale Systems based on Java, Corba, and Web Security Models". IEEE 1999. |