Security and communication in mobile object systems

  • Jan Vitek
  • Manuel Serrano
  • Dimitri Thanos
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1222)


Security Policy Shared Variable Address Space Object System Strong Typing 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    B. Bershad, S. Savage, P. Pardyak, E. G. Sirer, D. Becker, M. Fiuczynski, C. Chambers, and S. Eggers. Extensibility, Safety and Performance in the SPIN Operating System. In Proceedings of the 15th ACM Symposiumon Operating Systems Principles (SOSP-15), pages 267–284, Coppper Mountain, CO, 1996.Google Scholar
  2. [2]
    K. A. Bharat and L. Cardelli. Migratory applications. In Proceedings of ACM Symposium on User Interface Software and Technology '95, Pittsburgh, PA, Nov. 1995.Google Scholar
  3. [3]
    A. Black, N. Hutchinson, E. Jul, H. Levy, and L. Carter. Distribution and abstract types in Emerald. IEEE Trans. Softw. Eng., 13(1):65–76, Jan. 1987.Google Scholar
  4. [4]
    A. C. Bomberger, A. P. Frantz, W. S. Frantz, A. C. Hardy, N. Hardy, C. R. Landau, and J. S. Shapiro. The KeyKos nanokernel architecture. In Proceedings of the USENIX Workshop on Micro-Kernels and Other Kernel Architectures, pages 95–112. USENIX Association, April 1992.Google Scholar
  5. [5]
    L. Cardelli. Mobile computation. Position paper, Digital SRC, 1996.Google Scholar
  6. [6]
    J. S. Chase, H. M. Levy, M. J. Feeley, and E. D. Lazowska. Sharing and protection in a single address space operating system. ACM Transaction on Computer Systems, May 1994.Google Scholar
  7. [7]
    D. Chess, B. Grosof, and C. Harrison. Itinerant agents for mobile computing. IEEE Personal Communications, 2(4):34–49, Oct. 1995.Google Scholar
  8. [8]
    P. Ciancarini and D. Rossi: Jada: coordination and communication for Java agents. In [42].Google Scholar
  9. [9]
    D. Dean. The security of static typing with dynamic linking. In Fourth ACM Conference on Computer and Communications Security, Zurich, April 1997.Google Scholar
  10. [10]
    D. Dean, E. W. Felten, and D. S. Wallach. Java security: From Hotjava to Netscape and beyond. In 1996 IEEE Symposium on Security and Privacy, Oakland, CA, May 1996. IEEE, IEEE.Google Scholar
  11. [11]
    D. Denning and P. Denning. Certification of programs for secure information flow. Communications of the ACM, 20(7):504–513, July 1977.Google Scholar
  12. [12]
    A. Farkas and A. Dearle. Octopus: A reflective language mechanism for object manipulation. In Proceedings of the Fourth International Workshop on Database Programming Languages, Lecture Notes in Computer Science. Springer-Verlag, 1993.Google Scholar
  13. [13]
    A. Farkas and A. Dearle. The Octopus model and its implementation. Australian Computer Science Communications, 16(1), 1994.Google Scholar
  14. [14]
    A. O. Freier, P. Karlton, and P. C. Kocher. The SSL protocol (version 3.0). Technical report, Netscape Communication Corporation, Mar. 1996.Google Scholar
  15. [15]
    D. Gelernter. Linda in context. Commun. ACM, 32(4), Apr. 1989.Google Scholar
  16. [16]
    I. Goldberg, D. Wagner, R. Thomas, and E. A. Brewer. A secure environment for untrusted helper applications: Confining the wily hacker. In The Sixth USENIX Security Symposium Proceedings, pages 1–13, San Jose, California, July 1996. The Usenix Association.Google Scholar
  17. [17]
    T. Goldstein. The gateway security model in the Java electronic commerce framework. White paper, Sun Microsystems Laboratories / Javasoft, Decemeber 1996.Google Scholar
  18. [18]
    R. S. Gray. Agent tcl: A flexible and secure mobile-agent system. In Proceedings of the Fourth Annual Tcl/Tk Workshop, pages 9–23, 1996.Google Scholar
  19. [19]
    D. Hagimont, S. Krakowiak, J. Mossière, and X. R. de Pina. A selective protection scheme for the Java environment. Technical Report RT-Sirac-96-12, SIRAC, 1996.Google Scholar
  20. [20]
    B. Hailpern and H. Ossher. Extending object to support multiple interface and access control. IEEE Transaction on Software Engineering, 16(11): 1247–1257, November 1990.Google Scholar
  21. [21]
    T. Jaeger, A. D. Rubin, and A. Prakash. Building systems that flexibly control downloaded executable content. In The Sixth USENIX Security Symposium Proceedings, pages 131–148, San Jose, California, July 1996. The Usenix Association.Google Scholar
  22. [22]
    M. D. LaDue. Hostile applets on the horizon. 1996.Google Scholar
  23. [23]
    J. Lepreau, B. Ford, and M. Hibler. The persistent relevance of the local operating system to global applications. In Proceedings of the 1996 SIGOPS European Workshop, 1996.Google Scholar
  24. [24]
    B. Liskov, A. Adya, M. Castro, M. Day, S. Ghemawat, R. Gruber, U. Maheshwari, A. Myers, and L. Shrira. Safe and efficient sharing of persistent objects in thor. In Proceedings of SIGMOD '96, Montreal, Canada, June 1996.Google Scholar
  25. [25]
    C.V. Lopes. Adaptive parameter passing. In Symposium on Object Technologies for Advanced Software (ISOTAS'96), volume 1049 of Lecture Notes in Computer Science, Konazawa, Japan, March 1996. Springer-Verlag.Google Scholar
  26. [26]
    D. Maier, J. Stein, A. Otis, and A. Purdy. Development of an object-oriented DBMS. In OOPSLA'86 Conference Proceedings, pages 472–482, Portland, OR, September 1986. ACM.Google Scholar
  27. [27]
    S. Matsuoka and S. Kawai. Using tuple space communication in distributed object-oriented languages. In OOPSLA'88 Proceedings, pages 276–284, Sept. 1988.Google Scholar
  28. [28]
    Y. Minsky, R. van Renesse, F. B. Schneider, and S. D. Stoller. Cryptographic support for fault-tolerant distributed computing. In Proceedings of the 1996 SIGOPS European Workshop, July 1996.Google Scholar
  29. [29]
    R. Morrison, A. Brown, R. Connor, Q. I. Cutts, G. Kirby, A. Dearle, J. Rosenberg, and D. Stemple. Protection in Persistent Object Systems, In Security and Persistence, pages 48–66. Springer-Verlag, 1990.Google Scholar
  30. [30]
    George C. Necula. Proof-carrying code. In 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Language (POPL'97), pages 106–119, Paris, France, January 1997.Google Scholar
  31. [31]
    B. C. Neuman. Proxy-based authorization and accounting for distributed systems. In Procceedings of the 13th International Conference on Distributed Systems, Pittsburgh, PA, May 1993.Google Scholar
  32. [32]
    M. Ranganathan, A. Acharya, S. Sharma, and J. Saltz. Network-aware mobile programs. Research report, University of Maryland, 1996.Google Scholar
  33. [33]
    R. Riggs, A. Wolrath, J. Waldo, and K. Bharat. Pickling state in the java. In The Second Conference on Object-Oriented Technologies and Systems (COOTS) Procedings, pages 241–250, Toronto, Canada, June 1996. USENIX Press.Google Scholar
  34. [34]
    F. Rouaix. A Web navigator with applets in Caml. In Fifth WWW Conference, Paris, France, May 1996.Google Scholar
  35. [35]
    A. Rudloff, F. Matthes, and J. Schmidt. Security as an add-on quality in persistent object systems. In Second International East/West Database Workshop, Workshops in Computing, pages 90–108, Klagenfurt, Austria, 1995. Springer-Verlag.Google Scholar
  36. [36]
    M. Mira da Silva: Mobility and Persistence. In [42].Google Scholar
  37. [37]
    A. S. Tanenbaum, S. J. Mullender, and R. van Renesse. Using sparse cabilities in a distributed operating system. In Proceedings Sixth International Conference on Distributed Computer Systems. IEEE, 1986.Google Scholar
  38. [38]
    A.S. Tanenbaum, editor, Report of the Seventh ACM SIGOPS European Workshop, Connemara, Ireland, 9–11 Sepetember 1996.∼ast/Google Scholar
  39. [39]
    L. Tang and S. Low. Chrg-http: A tool for micropayments on the World Wide Web. In The Sixth USENIX Security Symposium Proceedings, pages 123–129. The Usenix Association, July 1996.Google Scholar
  40. [40]
    J. Tardo and L. Valente. Mobile Agent Security. In Proceedings of the 41th International Conference of the IEEE Computer Society (CompCon'96), February 1996.Google Scholar
  41. [41]
    C.-R. Tsai V. D. Gligor and C. S. Chandersekaran. On the identification of covert storage channels in secure systems. IEEE Transactions on Software Engineering, 16(6):569–580, June 1990.Google Scholar
  42. [42]
    J. Vitek, C. Tschudin, (eds): Mobile Object System: A first look at mobile object-oriented programs, Springer-Verlag, 1997.Google Scholar
  43. [43]
    D. Volpano. Provably-secure programming languages for remote evaluation. ACM Computing Surveys, 28A(2):electronic, December 1996.Google Scholar
  44. [44]
    D. Volpano and G. Smith. On the systematic design of web languages. ACM Computing Surveys, 28(2):315–317, June 1996.Google Scholar
  45. [45]
    D. Volpano and G. Smith. A type-based approach to program security. In 7th Int'l Joint Conference on the Theory and Practice of Software Development, April 1997.Google Scholar
  46. [46]
    D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. Journal of Computer Security, 28(2): 1–21, 1996.Google Scholar
  47. [47]
    R. Wahbe, S. Lucco, T. E. Anderson, and S. L. Graham. Efficient software-based fault isolation. In Proceedings of the Symposium on Operating Systems Principles, 1993.Google Scholar
  48. [48]
    K. M. Walker, D. F. Stern, L. Badger, K. A. Oosendorp, M. J. Petkac, and D. L. Sherman. Confining root programs with domain and type enforcement (dte). In The Sixth USENIX Security Symposium Proceedings, pages 21–36. The Usenix Association, July 1996.Google Scholar
  49. [49]
    J. E. White. Telescript Technology: The foundation for the electronic marketplace. General Magic White Paper, General Magic, Inc. 1994.Google Scholar
  50. [50]
    A. Wolrath, R. Riggs, and J. Waldo. A distributed object model for the Java system. In The Second Conference on Object-Oriented Technologies and Systems (COOTS) Procedings, pages 219–231, Toronto, Canada, June 1996. USENIX Press.Google Scholar
  51. [51]
    C. Yoshikawa, B. Chun, and D. Culler. Web graffiti & high bandwirth covert channels using java. January 1997.Google Scholar
  52. [52]
    C. F. Yu and V. D. Gligor. A specification and verification method for preventing denial of service. IEEE Transactions on Software Engineering, 16(6):581–595, June 1990.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1997

Authors and Affiliations

  • Jan Vitek
  • Manuel Serrano
  • Dimitri Thanos

There are no affiliations available

Personalised recommendations