Case studies in security and resource management for mobile object systems

被引:1
|
作者
Milojicic, D
Agha, G
Bernadat, P
Chauhan, D
Guday, S
Jamali, N
Lambright, D
Travostino, F
机构
[1] Hewlett Packard Labs, Palo Alto, CA 94303 USA
[2] Univ Illinois, Dept Comp Sci, Open Syst Lab, Urbana, IL 61801 USA
[3] Hewlett Packard Corp, F-38053 Grenoble 9, France
[4] Nokia, Burlington, MA 01803 USA
[5] Microsoft Corp, Redmond, WA 98052 USA
[6] EMC, Watertown, MA 02472 USA
[7] Nortel Networks, Arlington, MA 02474 USA
关键词
security; resource management; mobility;
D O I
10.1023/A:1013444932711
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile objects have gained a lot of attention in research and industry in the recent past, but they also have a long history. Security is one of the key requirements of mobile objects, and one of the most researched characteristics related to mobility. Resource management has been somewhat neglected in the past, but it is being increasingly addressed, in both the context of security and QoS. In this paper we place a few systems supporting mobile objects in perspective based upon how they address security and resource management. We start with the theoretical model of Actors that supports concurrent mobile objects in a programming environment. Then we describe task migration for the Mach microkernel, a case of mobile objects supported by an operating system. Using the OMG MASIF standard as an example, we then analyze middleware support for mobile objects. Mobile Objects and Agents (MOA) system, is an example of middleware level support based on Java. The active networks project, Conversant, supports object mobility at the communication protocol level. We summarize these projects, comparing their security and resource management, and conclude by deriving a few general observations on how security and resource management have been applied and how they might evolve in the future.
引用
收藏
页码:45 / 79
页数:35
相关论文
共 50 条
  • [1] Case Studies in Security and Resource Management for Mobile Object Systems
    Dejan Milojicic
    Gul Agha
    Philippe Bernadat
    Deepika Chauhan
    Shai Guday
    Nadeem Jamali
    Dan Lambright
    Franco Travostino
    Autonomous Agents and Multi-Agent Systems, 2002, 5 : 45 - 79
  • [2] Case studies in security and resource management for mobile objects
    Milojicic, D
    Agha, G
    Bernadat, P
    Chauhan, D
    Guday, S
    Jamali, N
    Lambright, D
    OBJECT-ORIENTED TECHNOLOGY: ECOOP'98 WORKSHOP READER, 1998, 1543 : 306 - 306
  • [3] Resource management for mobile operating systems based on the active object model
    Garcia-Valls, Marisol
    Crespo, Alfons
    Vila, Joan
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2013, 28 (04): : 225 - 235
  • [4] Security and communication in mobile object systems
    Vitek, J
    Serrano, M
    Thanos, D
    MOBILE OBJECT SYSTEMS: TOWARDS THE PROGRAMMABLE INTERNET, 1997, 1222 : 177 - 199
  • [5] Security Management for Mobile Learning Systems
    Zamfiroiu, Alin
    ELEARNING CHALLENGES AND NEW HORIZONS, VOL 1, 2018, : 42 - 48
  • [6] Mobile object systems: Resource-aware computation
    Bryce, C
    Czajkowski, C
    OBJECT-ORIENTED TECHNOLOGY, 2003, 3013 : 86 - 91
  • [7] Resource Management for Mobile Publish/Subscribe Systems
    Abdennadher, Fatma
    Ben Jemaa, Maher
    2017 25TH EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND NETWORK-BASED PROCESSING (PDP 2017), 2017, : 191 - 198
  • [8] Authentic Learning of Mobile Security with Case Studies
    Guo, Minzhe
    Bhattacharya, Prabir
    Qian, Kai
    Yang, Li
    2013 IEEE FRONTIERS IN EDUCATION CONFERENCE, 2013,
  • [9] SECURITY STANDARDS FOR OBJECT DATA MANAGEMENT-SYSTEMS
    ASHBY, V
    SCHLIPPER, L
    COMPUTER STANDARDS & INTERFACES, 1991, 13 (1-3) : 297 - 302
  • [10] Data management in CIM systems - A mobile object approach
    Patankar, AK
    Segev, A
    INTEGRATED COMPUTER-AIDED ENGINEERING, 1996, 3 (01) : 68 - 81