Case studies in security and resource management for mobile object systems

被引:1
|
作者
Milojicic, D
Agha, G
Bernadat, P
Chauhan, D
Guday, S
Jamali, N
Lambright, D
Travostino, F
机构
[1] Hewlett Packard Labs, Palo Alto, CA 94303 USA
[2] Univ Illinois, Dept Comp Sci, Open Syst Lab, Urbana, IL 61801 USA
[3] Hewlett Packard Corp, F-38053 Grenoble 9, France
[4] Nokia, Burlington, MA 01803 USA
[5] Microsoft Corp, Redmond, WA 98052 USA
[6] EMC, Watertown, MA 02472 USA
[7] Nortel Networks, Arlington, MA 02474 USA
关键词
security; resource management; mobility;
D O I
10.1023/A:1013444932711
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile objects have gained a lot of attention in research and industry in the recent past, but they also have a long history. Security is one of the key requirements of mobile objects, and one of the most researched characteristics related to mobility. Resource management has been somewhat neglected in the past, but it is being increasingly addressed, in both the context of security and QoS. In this paper we place a few systems supporting mobile objects in perspective based upon how they address security and resource management. We start with the theoretical model of Actors that supports concurrent mobile objects in a programming environment. Then we describe task migration for the Mach microkernel, a case of mobile objects supported by an operating system. Using the OMG MASIF standard as an example, we then analyze middleware support for mobile objects. Mobile Objects and Agents (MOA) system, is an example of middleware level support based on Java. The active networks project, Conversant, supports object mobility at the communication protocol level. We summarize these projects, comparing their security and resource management, and conclude by deriving a few general observations on how security and resource management have been applied and how they might evolve in the future.
引用
收藏
页码:45 / 79
页数:35
相关论文
共 50 条
  • [11] Security requirements for management systems using mobile agents
    Reiser, H.
    Vogt, G.
    IEEE Symposium on Computers and Communications - Proceedings, 2000, : 160 - 165
  • [12] Identity Authentication Security Management in Mobile Payment Systems
    Wang, Feng
    Shan, Ge Bao
    Chen, Yong
    Zheng, Xianrong
    Wang, Hong
    Sun Mingwei
    Li Haihua
    JOURNAL OF GLOBAL INFORMATION MANAGEMENT, 2020, 28 (01) : 189 - 203
  • [13] Security requirements for management systems using mobile agents
    Reiser, H
    Vogt, G
    ISCC 2000: FIFTH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, PROCEEDINGS, 2000, : 160 - 165
  • [14] Case studies of scenario analysis for adaptive management of natural resource and infrastructure systems
    Hamilton M.C.
    Thekdi S.A.
    Jenicek E.M.
    Harmon R.S.
    Goodsite M.E.
    Case M.P.
    Karvetski C.W.
    Lambert J.H.
    Environment Systems & Decisions, 2013, 33 (1): : 89 - 103
  • [15] Security-Aware Resource Allocation for Mobile Cloud Computing Systems
    Liu, Yanchen
    Lee, Myung J.
    24TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS ICCCN 2015, 2015,
  • [16] AI-based Security Design of Mobile Crowdsensing Systems: Review, Challenges and Case Studies
    Zhang, Yuegian
    Kantarci, Burak
    2019 13TH IEEE INTERNATIONAL CONFERENCE ON SERVICE-ORIENTED SYSTEM ENGINEERING (SOSE) / 10TH INTERNATIONAL WORKSHOP ON JOINT CLOUD COMPUTING (JCC) / IEEE INTERNATIONAL WORKSHOP ON CLOUD COMPUTING IN ROBOTIC SYSTEMS (CCRS), 2019, : 17 - 26
  • [17] Object management for network-centric systems with mobile objects
    Lavva, B
    Holder, O
    BenShaul, I
    THIRD IEEE INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS, PROCEEDINGS, 1997, : 186 - 195
  • [18] Replicated Object Management with Periodic Maintenance in Mobile Wireless Systems
    Ding-Chau Wang
    Ing-Ray Chen
    Chih-Ping Chu
    I-Ling Yen
    Wireless Personal Communications, 2004, 28 : 17 - 33
  • [19] Replicated object management with periodic maintenance in mobile wireless systems
    Wang, DC
    Chen, IR
    Chu, CP
    Yen, IL
    WIRELESS PERSONAL COMMUNICATIONS, 2004, 28 (01) : 17 - 33
  • [20] A Survey on Resource Management and Security Issues in IoT Operating Systems
    AlDossary, Noura
    AlQahtani, Sarah
    AlUbaidan, Haya
    2022 FIFTH INTERNATIONAL CONFERENCE OF WOMEN IN DATA SCIENCE AT PRINCE SULTAN UNIVERSITY (WIDS-PSU 2022), 2022, : 26 - 30