首页 | 本学科首页   官方微博 | 高级检索  
     


Case Studies in Security and Resource Management for Mobile Object Systems
Authors:Dejan Milojicic  Gul Agha  Philippe Bernadat  Deepika Chauhan  Shai Guday  Nadeem Jamali  Dan Lambright  Franco Travostino
Affiliation:(1) Hewlett-Packard Laboratories, MailStop 3U-18, 1501 Page Mill Road, Palo Alto, CA 94303, USA;(2) Open Systems Laboratory, Department of Computer Science, University of Illinois at Urbana-Champaign, Urbana, IL 61801, USA;(3) Hewlett-Packard, 5, avenue Raymond Chanas–Eybens, 38053 Grenoble Cedex 9, France;(4) Nokia, 5 Wayside Drive, Burlington, MA 01803, USA;(5) Microsoft Corporation, 1 Microsoft Way, Redmond, WA 98052, USA;(6) Open Systems Laboratory, Department of Computer Science, University of Illinois at Urbana-Champaign, Urbana, IL 61801, USA;(7) EMC, 12 Green Street Unit 3, Watertown, MA 02472, USA;(8) Nortel Networks, 53 Westmoreland Avenue, Arlington, MA 02474, USA
Abstract:Mobile objects have gained a lot of attention in research and industry in the recent past, but they also have a long history. Security is one of the key requirements of mobile objects, and one of the most researched characteristics related to mobility. Resource management has been somewhat neglected in the past, but it is being increasingly addressed, in both the context of security and QoS. In this paper we place a few systems supporting mobile objects in perspective based upon how they address security and resource management. We start with the theoretical model of Actors that supports concurrent mobile objects in a programming environment. Then we describe task migration for the Mach microkernel, a case of mobile objects supported by an operating system. Using the OMG MASIF standard as an example, we then analyze middleware support for mobile objects. Mobile Objects and Agents (MOA) system, is an example of middleware level support based on Java. The active networks project, Conversant, supports object mobility at the communication protocol level. We summarize these projects, comparing their security and resource management, and conclude by deriving a few general observations on how security and resource management have been applied and how they might evolve in the future.
Keywords:security  resource management  mobility
本文献已被 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号