Table of contents : Front Matter....Pages 1-1 Trust: Benefits, Models, and Mechanisms....Pages 3-18 Protection in Programming-Language Translations....Pages 19-34 Reflective Authorization Systems: Possibilities, Benefits, and Drawbacks....Pages 35-49 Abstractions for Mobile Computation....Pages 51-94 Type-Safe Execution of Mobile Agents in Anonymous Networks....Pages 95-115 Types as Specifications of Access Policies....Pages 117-146 Security Properties of Typed Applets....Pages 147-182 Front Matter....Pages 183-183 The Role of Trust Management in Distributed Systems Security....Pages 185-210 Distributed Access-Rights Management with Delegation Certificates....Pages 211-235 A View-Based Access Control Model for CORBA....Pages 237-252 Apoptosis — the Programmed Death of Distributed Services....Pages 253-260 A Sanctuary for Mobile Agents....Pages 261-273 Mutual Protection of Co-operating Agents....Pages 275-285 Front Matter....Pages 287-287 Access Control in Configurable Systems....Pages 289-316 Providing Policy-Neutral and Transparent Access Control in Extensible Systems....Pages 317-338 Interposition Agents: Transparently Interposing User Code at the System Interface....Pages 339-368 J-Kernel: A Capability-Based Operating System for Java....Pages 369-393 Secure Network Objects....Pages 395-412 History-Based Access Control for Mobile Code....Pages 413-431 Security in Active Networks....Pages 433-451 Front Matter....Pages 287-287 Using Interfaces to Specify Access Rights....Pages 453-468 Introducing Trusted Third Parties to the Mobile Agent Paradigm....Pages 469-489