Fourth International Workshop, MOS'98
Brussels, Belgium, July 1998
Springer-Verlag Lecture Notes in Computer Science
1999
| Luca Cardelli | Abstractions for Mobile Computation |
| M. Abadi | Protection in Programming Language Translation |
| X. Leroy and F. Rouaix | Security properties of typed applets |
| M. Hennessey and J. Riely | Type-safe Execution of Mobile Agents in Anonymous Networks |
| R. De Nicola, G.L. Ferrari, R. Pugliese | Types as Specifications of Access Policies |
| Vipin Swarup, Javier Thayer Fabrega | Understanding Trust |
| M. Blaze, J. Feigenbaum, J. Ioannidis, A. Keromytis | The Role of Trust Management in Distributed Systems Security |
| T. Jaeger | Access Control in Configurable Systems |
| R. Grimm and B. Bershad | Providing Policy Neutral and Transparent Access Control in Extensible Systems |
| T. Aura | Distributed access rights management with delegation certificates |
| G. Brose | A View-Based Access Control Model for CORBA |
| M. Ancona, W. Cazzola, E. Fernandez | Reflective Authorization Systems: Possibilitie, Benefits and Drawbacks |
| Doorn L. van, Abadi M., Burrows M., Wobber E. | Secure Network Objects |
| Mike B. Jones | Interposition Agents: Transparently Interposing User Code at the System Interface |
| D.S. Alexander, W.A. Arbaugh, A.D. Keromytis, J.M. Smith | Security in Active Networks |
| T. von Eicken | J-Kernel a capability based operating system for Java |
| B. Yee | A Sancturary for Mobile Agents |
| G. Edjlali, A. Acharya, V. Chaudhary | History-based Access Control for Mobile Code |
| U. Wilhelm, S. Staamann, L. Buttyan | Introducing Trusted Third Parties to the Mobile Agent Paradigm |
| Christian Tschudin | Apoptosis --- The programmed death of distributed services |
| V. Roth | Mutual Protection of Co-operating Agents |
| J. Hulaas, A Villazon, J Harms | User Interfaces as a General Mechanism for the Specification of Functionality and Access Rights in Open Dynamic Environments |