Skip to main content

Safe and secure execution mechanisms for mobile objects

  • Conference paper
  • First Online:
Mobile Object Systems Towards the Programmable Internet (MOS 1996)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1222))

Included in the following conference series:

Abstract

Recent software trends such as Internet computing and intelligent software agents are accelerating the paradigm-shift of distributed programming from message passing to object passing. Mobile object technology may become a key technology in the computing systems of the next decade. The safe and secure execution of mobile objects is one of the most significant issues in implementing mobile object systems, and currently new techniques are being developed enthusiastically.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. A. Adl-Tabatabai, G. Langdale, S. Lucco, and R. Wahbe. Efficient and language-independent mobile programs. In Proc. of ACM Conf. on Programming Language Design and Implementation, pages 127–136, May 1996.

    Google Scholar 

  2. B. Bershad, S. Savage, P. Pardyak, E. G. Sirer, D. Becker, M. Fiuczynski, C. Chambers, and S. Eggers. Extensibility, safety and performance in the SPIN operating system. In Proc. of Symposium on Operating System Principles, pages 267–284, Dec. 1995.

    Google Scholar 

  3. A. D. Birrell and B. J. Nelson. Implementing remote procedure calls. ACM Trans. Computer Systems, 2 (1):39–59, Feb. 1984.

    Google Scholar 

  4. M. Campione and K. Walrath. The Java Tutorial—Object-Oriented Programming for the Internet. Addison-Wesley, 1996.

    Google Scholar 

  5. P. Chan and R. Lee. The Java Class Libraries—An Annotated Reference. Addison-Wesley, 1996.

    Google Scholar 

  6. General Magic Inc. An introduction to safety and security in Telescript, 1996.

    Google Scholar 

  7. E. Jul, H. Levy, N. Hutchinson, and A. Black. Fine-grained mobility in the Emerald system. ACM Trans. Computer Systems, 6(1):109–133, Feb. 1988.

    Google Scholar 

  8. K. Kato, K. Toumura, K. Matsubara, S. Aikawa, J. Yoshida, K. Kono, K. Taura, and T. Sekiguchi. Protected and secure mobile object computing in Planet. In Proc. of ECOOP Workshop on Mobile Object Systems, 1996.

    Google Scholar 

  9. K. Kono, K. Kato, and T. Masuda. Smart remote procedure calls: Transparent treatment of remote pointers. In Proc. 14th IEEE Int. Conf. on Distributed Computing Systems, pages 142–151, Jun. 1994.

    Google Scholar 

  10. K. Kono, K. Kato, and T. Masuda. An implementation method of migratable distributed objects using an RPC technique integrated with virtual memory. In Proc. 10th European Conference of Object-Oriented Programming, pages 295–315, Jul. 1996.

    Google Scholar 

  11. T. Lindholm and F. Yellin. The Java Virtual Machine Specification. Addison-Wesley, 1997.

    Google Scholar 

  12. S. Lucco, O. Sharp, and R. Wahbe. Omniware: A universal substrate fro web programming. In Proc. 4th Int. World Wide Web Conference, Dec. 1995.

    Google Scholar 

  13. G. C. Necula. Proof-carrying code. In Proc. ACM Symp. on Principles of Programming Languages, Jan. 1997.

    Google Scholar 

  14. G. C. Necula and P. Lee. Safe kernel extensions without run-time checking. In Proc. USENIX Association 2nd Symp. on Operating Systems Design and Implementation, pages 229–243, Oct. 1996.

    Google Scholar 

  15. Object Management Group, Inc. CORBA security. Technical report, Object Management Group, Inc., 1995.

    Google Scholar 

  16. A. Ohori and K. Kato. Semantics for communication primitives in a polymorphic language. In Proc. 20th ACM Symp. on Principles of Programming Languages, pages 99–112, Jan. 1993.

    Google Scholar 

  17. J. K. Ousterhout. Tcl and the Tk Toolkit. Addison-Wesley, 1994. ISBN 0-201-63337-X.

    Google Scholar 

  18. J. K. Ousterhout, J. Y. Levy, and B. B. Welch. The safe-tel security model. Technical report, Sun Microsystems Laboratories, Nov. 1996.

    Google Scholar 

  19. A. Silberschatz and P. B. Galvin. Operating System Concepts. Addison-Wesley, 1994.

    Google Scholar 

  20. J. Vitek. Secure object spaces. In Proc. of 2nd Int. Workshop on Mobile Object Systems, Linz, July 1996.

    Google Scholar 

  21. R. Wahbe, S. Lucco, T. E. Anderson, and S. L. Graham. Efficient software-based fault isolation. In Proc. 14th ACM Symp. on Operating System Principles, pages 203–216, 1993.

    Google Scholar 

  22. P. Wilson. Pointer swizzling at page fault time: efficiently supporting huge address spaces on standard hardware. ACM Computer Architecture News, pages 6–13, Jun. 1991.

    Google Scholar 

Download references

Authors

Editor information

Jan Vitek Christian Tschudin

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kato, K. (1997). Safe and secure execution mechanisms for mobile objects. In: Vitek, J., Tschudin, C. (eds) Mobile Object Systems Towards the Programmable Internet. MOS 1996. Lecture Notes in Computer Science, vol 1222. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-62852-5_15

Download citation

  • DOI: https://doi.org/10.1007/3-540-62852-5_15

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-62852-1

  • Online ISBN: 978-3-540-68705-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics