Advertisement

Safe and secure execution mechanisms for mobile objects

  • Kazuhiko Kato
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1222)

Abstract

Recent software trends such as Internet computing and intelligent software agents are accelerating the paradigm-shift of distributed programming from message passing to object passing. Mobile object technology may become a key technology in the computing systems of the next decade. The safe and secure execution of mobile objects is one of the most significant issues in implementing mobile object systems, and currently new techniques are being developed enthusiastically.

Keywords

Security Policy Mobile Object Runtime System Object Interaction Remote Procedure Call 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    A. Adl-Tabatabai, G. Langdale, S. Lucco, and R. Wahbe. Efficient and language-independent mobile programs. In Proc. of ACM Conf. on Programming Language Design and Implementation, pages 127–136, May 1996.Google Scholar
  2. 2.
    B. Bershad, S. Savage, P. Pardyak, E. G. Sirer, D. Becker, M. Fiuczynski, C. Chambers, and S. Eggers. Extensibility, safety and performance in the SPIN operating system. In Proc. of Symposium on Operating System Principles, pages 267–284, Dec. 1995.Google Scholar
  3. 3.
    A. D. Birrell and B. J. Nelson. Implementing remote procedure calls. ACM Trans. Computer Systems, 2 (1):39–59, Feb. 1984.Google Scholar
  4. 4.
    M. Campione and K. Walrath. The Java Tutorial—Object-Oriented Programming for the Internet. Addison-Wesley, 1996.Google Scholar
  5. 5.
    P. Chan and R. Lee. The Java Class Libraries—An Annotated Reference. Addison-Wesley, 1996.Google Scholar
  6. 6.
    General Magic Inc. An introduction to safety and security in Telescript, 1996.Google Scholar
  7. 7.
    E. Jul, H. Levy, N. Hutchinson, and A. Black. Fine-grained mobility in the Emerald system. ACM Trans. Computer Systems, 6(1):109–133, Feb. 1988.Google Scholar
  8. 8.
    K. Kato, K. Toumura, K. Matsubara, S. Aikawa, J. Yoshida, K. Kono, K. Taura, and T. Sekiguchi. Protected and secure mobile object computing in Planet. In Proc. of ECOOP Workshop on Mobile Object Systems, 1996.Google Scholar
  9. 9.
    K. Kono, K. Kato, and T. Masuda. Smart remote procedure calls: Transparent treatment of remote pointers. In Proc. 14th IEEE Int. Conf. on Distributed Computing Systems, pages 142–151, Jun. 1994.Google Scholar
  10. 10.
    K. Kono, K. Kato, and T. Masuda. An implementation method of migratable distributed objects using an RPC technique integrated with virtual memory. In Proc. 10th European Conference of Object-Oriented Programming, pages 295–315, Jul. 1996.Google Scholar
  11. 11.
    T. Lindholm and F. Yellin. The Java Virtual Machine Specification. Addison-Wesley, 1997.Google Scholar
  12. 12.
    S. Lucco, O. Sharp, and R. Wahbe. Omniware: A universal substrate fro web programming. In Proc. 4th Int. World Wide Web Conference, Dec. 1995.Google Scholar
  13. 13.
    G. C. Necula. Proof-carrying code. In Proc. ACM Symp. on Principles of Programming Languages, Jan. 1997.Google Scholar
  14. 14.
    G. C. Necula and P. Lee. Safe kernel extensions without run-time checking. In Proc. USENIX Association 2nd Symp. on Operating Systems Design and Implementation, pages 229–243, Oct. 1996.Google Scholar
  15. 15.
    Object Management Group, Inc. CORBA security. Technical report, Object Management Group, Inc., 1995.Google Scholar
  16. 16.
    A. Ohori and K. Kato. Semantics for communication primitives in a polymorphic language. In Proc. 20th ACM Symp. on Principles of Programming Languages, pages 99–112, Jan. 1993.Google Scholar
  17. 17.
    J. K. Ousterhout. Tcl and the Tk Toolkit. Addison-Wesley, 1994. ISBN 0-201-63337-X.Google Scholar
  18. 18.
    J. K. Ousterhout, J. Y. Levy, and B. B. Welch. The safe-tel security model. Technical report, Sun Microsystems Laboratories, Nov. 1996.Google Scholar
  19. 19.
    A. Silberschatz and P. B. Galvin. Operating System Concepts. Addison-Wesley, 1994.Google Scholar
  20. 20.
    J. Vitek. Secure object spaces. In Proc. of 2nd Int. Workshop on Mobile Object Systems, Linz, July 1996.Google Scholar
  21. 21.
    R. Wahbe, S. Lucco, T. E. Anderson, and S. L. Graham. Efficient software-based fault isolation. In Proc. 14th ACM Symp. on Operating System Principles, pages 203–216, 1993.Google Scholar
  22. 22.
    P. Wilson. Pointer swizzling at page fault time: efficiently supporting huge address spaces on standard hardware. ACM Computer Architecture News, pages 6–13, Jun. 1991.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1997

Authors and Affiliations

  • Kazuhiko Kato

There are no affiliations available

Personalised recommendations