Skip to main content

Resource Management for Safe Languages

  • Conference paper
  • First Online:
  • 793 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2548))

Abstract

Safe programming languages offer safety and security features making them attractive for developing extensible environments on a wide variety of platforms, ranging from large servers all the way down to hand-held devices.Ex tensible environments facilitate dynamic hosting of a variety of potentially untrusted codes.Th is requires mechanisms to guarantee isolation among hosted applications and to control their usage of resources.W hile most safe languages provide certain isolation properties, typically resource management is difficult with the current standard APIs and existing virtual machines. This one-day workshop brought together practitioners and researchers working on various approaches to these problems to share ideas and experience.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Java Community Process.JS R-121: Application Isolation API Specification. http://jcp.org/jsr/detail/121.jsp.

  2. Walter Binder, Jarle Hulaas, and Alex Villazón. Resource control in J-SEAL2. Technical Report Cahier du CUI No.124, University of Geneva, October 2000. ftp://cui.unige.ch/pub/tios/papers/TR-124-2000.pdf.

  3. Walter Binder, Jarle Hulaas, Alex Villazón, and Rory Vidal. Portable resource control in Java: The J-SEAL2 approach.In ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA-2001), Tampa Bay, Florida, USA, October 2001.

    Google Scholar 

  4. Grzegorz Czajkowski and Thorsten von Eicken. J Res: A resource accounting interface for Java.In Proceedings of the 13th Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA-98), volume 33, 10 of ACM SIGPLAN Notices, pages 21–35, New York, USA, October 18–22 1998. ACM Press.

    Google Scholar 

  5. Alex Villazón and Walter Binder.Portable resource reification in Java-based mobile agent systems.In Fifth IEEE International Conference on Mobile Agents (MA-2001), Atlanta, Georgia, USA, December 2001.

    Google Scholar 

  6. William A.K ornfeld and Carl E.H ewitt. The Scientific Community Metaphor. IEEE Trans. on Systems, Man, and Cybernetics, pages 24–33, January 1981.

    Google Scholar 

  7. Luc Moreau and Christian Queinnec.Design and Semantics of Quantum: a Language to Control Resource Consumption in Distributed Computing.In Usenix Conference on Domain-Specific Languages (DSL’97), pages 183~197, Santa-Barbara, California, October 1997.

    Google Scholar 

  8. Luc Moreau and Christian Queinnec.Distributed Computations Driven by Resource Consumption.In IEEE International Conference on Computer Languages (ICCL’98), pages 68~77, Chicago, Illinois, May 1998.

    Google Scholar 

  9. G. Banga, P. Druschel, and J. Mogul. Resource containers: a new facility for resource management in server systems. In In Proceedings of the 3rd USENIX Symposium on Operating system design and implementation, Feb.1999.

    Google Scholar 

  10. Walter Binder.J-SEAL2 — A secure high-performance mobile agent system.In IAT’99 Workshop on Agents in Electronic Commerce, Hong Kong, December 1999.

    Google Scholar 

  11. Nicolas Le Sommer and Frederic Guidec.A Contract-Based Approach of Resource-Constrained Software Deployment. In J.vanLeeuwen G. Goos, J. Hartmanis, editor, Proceedings of the First International IFIP/ACM Working Conference on Component Deployment (CD’2002, Berlin, Germany), number 2370 in Lecture Notes in Computer Science, pages 15~30.Springer, June 2002.

    Google Scholar 

  12. Nicolas Le Sommer and Frederic Guidec.JAMUS: Java Accommodation of Mobile Untrusted Software.In 4th EurOpen/USENIX Conference (NordU’2002, Helsinki, Finland), February 2002.http://www.univubs. fr/valoria/Orcade/RASC/Publications/NordU2002.pdf.

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Czajkowski, G., Vitek, J. (2002). Resource Management for Safe Languages. In: Hernández, J., Moreira, A. (eds) Object-Oriented Technology ECOOP 2002 Workshop Reader. ECOOP 2002. Lecture Notes in Computer Science, vol 2548. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36208-8_1

Download citation

  • DOI: https://doi.org/10.1007/3-540-36208-8_1

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00233-8

  • Online ISBN: 978-3-540-36208-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics