Case studies in security and resource management for mobile object systems

被引:1
|
作者
Milojicic, D
Agha, G
Bernadat, P
Chauhan, D
Guday, S
Jamali, N
Lambright, D
Travostino, F
机构
[1] Hewlett Packard Labs, Palo Alto, CA 94303 USA
[2] Univ Illinois, Dept Comp Sci, Open Syst Lab, Urbana, IL 61801 USA
[3] Hewlett Packard Corp, F-38053 Grenoble 9, France
[4] Nokia, Burlington, MA 01803 USA
[5] Microsoft Corp, Redmond, WA 98052 USA
[6] EMC, Watertown, MA 02472 USA
[7] Nortel Networks, Arlington, MA 02474 USA
关键词
security; resource management; mobility;
D O I
10.1023/A:1013444932711
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile objects have gained a lot of attention in research and industry in the recent past, but they also have a long history. Security is one of the key requirements of mobile objects, and one of the most researched characteristics related to mobility. Resource management has been somewhat neglected in the past, but it is being increasingly addressed, in both the context of security and QoS. In this paper we place a few systems supporting mobile objects in perspective based upon how they address security and resource management. We start with the theoretical model of Actors that supports concurrent mobile objects in a programming environment. Then we describe task migration for the Mach microkernel, a case of mobile objects supported by an operating system. Using the OMG MASIF standard as an example, we then analyze middleware support for mobile objects. Mobile Objects and Agents (MOA) system, is an example of middleware level support based on Java. The active networks project, Conversant, supports object mobility at the communication protocol level. We summarize these projects, comparing their security and resource management, and conclude by deriving a few general observations on how security and resource management have been applied and how they might evolve in the future.
引用
收藏
页码:45 / 79
页数:35
相关论文
共 50 条
  • [31] Teaching Security Management with Case Studies: Experiences and Evaluation
    Yuan, Xiaohong
    Jiang, Keyu
    Murthy, Sahana
    Jones, Jonathan
    Yu, Huiming
    IMSCI 10: 4TH INTERNATIONAL MULTI-CONFERENCE ON SOCIETY, CYBERNETICS AND INFORMATICS, VOL II (POST-CONFERENCE EDITION), 2010, : 245 - 250
  • [32] Case studies in work, employment and human resource management
    Kozhevnikov, Andrew
    NEW TECHNOLOGY WORK AND EMPLOYMENT, 2022, 37 (02) : 338 - 341
  • [33] Network planning & resource management issues for mobile multimedia CDMA systems
    Dimitriou, N
    VTC2004-SPRING: 2004 IEEE 59TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-5, PROCEEDINGS, 2004, : 2341 - 2345
  • [34] SeCARA: A security and cost-aware resource allocation method for mobile cloudlet systems
    Raei, Hassan
    Ilkhani, Ensieh
    Nikooghadam, Morteza
    AD HOC NETWORKS, 2019, 86 : 103 - 118
  • [35] Radio resource management schemes for combined GSM/GPRS mobile systems
    Konstantinopoulou, CN
    Koutsopoulos, KA
    Demestichas, PP
    Theologou, ME
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2003, 3 (03): : 357 - 384
  • [36] A Resource Management Architecture for Mobile Satellite-based Communication Systems
    Driess, Philipp
    Evers, Florian
    Brueckner, Markus
    EIGHTH ADVANCED INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (AICT 2012), 2012, : 138 - 143
  • [37] Mobile customer relationship management and mobile security
    Sanayei, Ali
    Mirzaei, Abas
    GLOBAL E-SECURITY, PROCEEDINGS, 2008, 12 : 274 - 287
  • [38] A mobile agent security management
    You, EG
    Lee, KS
    18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 360 - 365
  • [39] A Case for Lease-Based, Utilitarian Resource Management on Mobile Devices
    Hu, Yigong
    Liu, Suyi
    Huang, Peng
    TWENTY-FOURTH INTERNATIONAL CONFERENCE ON ARCHITECTURAL SUPPORT FOR PROGRAMMING LANGUAGES AND OPERATING SYSTEMS (ASPLOS XXIV), 2019, : 301 - 315
  • [40] On security in mobile agent systems
    Arunkumar, S
    Nagender, S
    PROCEEDINGS OF THE ICCC 2002: 15TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION, VOLS 1 AND 2: REDEFINING INTERNET IN THE CONTEXT OF PERVASIVE COMPUTING, 2002, : 631 - 642