Case Studies in Security and Resource Management for Mobile Object Systems

被引:0
|
作者
Dejan Milojicic
Gul Agha
Philippe Bernadat
Deepika Chauhan
Shai Guday
Nadeem Jamali
Dan Lambright
Franco Travostino
机构
[1] Hewlett-Packard Laboratories,Open Systems Laboratory, Department of Computer Science
[2] University of Illinois at Urbana-Champaign,Open Systems Laboratory, Department of Computer Science
[3] Hewlett-Packard,undefined
[4] Nokia,undefined
[5] Microsoft Corporation,undefined
[6] University of Illinois at Urbana-Champaign,undefined
[7] EMC,undefined
[8] Nortel Networks,undefined
来源
Autonomous Agents and Multi-Agent Systems | 2002年 / 5卷
关键词
security; resource management; mobility;
D O I
暂无
中图分类号
学科分类号
摘要
Mobile objects have gained a lot of attention in research and industry in the recent past, but they also have a long history. Security is one of the key requirements of mobile objects, and one of the most researched characteristics related to mobility. Resource management has been somewhat neglected in the past, but it is being increasingly addressed, in both the context of security and QoS. In this paper we place a few systems supporting mobile objects in perspective based upon how they address security and resource management. We start with the theoretical model of Actors that supports concurrent mobile objects in a programming environment. Then we describe task migration for the Mach microkernel, a case of mobile objects supported by an operating system. Using the OMG MASIF standard as an example, we then analyze middleware support for mobile objects. Mobile Objects and Agents (MOA) system, is an example of middleware level support based on Java. The active networks project, Conversant, supports object mobility at the communication protocol level. We summarize these projects, comparing their security and resource management, and conclude by deriving a few general observations on how security and resource management have been applied and how they might evolve in the future.
引用
收藏
页码:45 / 79
页数:34
相关论文
共 50 条
  • [21] Mobile object systems
    Bryce, C
    Razafimahefa, C
    OBJECT-ORIENTED TECHNOLOGY, PROCEEDINGS, 2000, 1964 : 241 - 255
  • [22] Information Security Management Scaffold for Mobile Money Systems in Uganda
    Kanobe, Fredrick
    Alexander, Margaret Patricia
    Bwalya, Kelvin Joseph
    PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019), 2019, : 239 - 247
  • [23] Evolutionary genetic DCA for resource management in mobile satellite systems
    Asvial, M
    Evans, BG
    Tafazolli, R
    ELECTRONICS LETTERS, 2002, 38 (20) : 1213 - 1214
  • [24] Radio resource management of heterogeneous services in mobile WiMax systems
    Huang, ChingYao
    Juan, Hung-Hui
    Lin, Meng-Shiang
    Chang, Chung-Ju
    IEEE WIRELESS COMMUNICATIONS, 2007, 14 (01) : 20 - 26
  • [25] A framework for resource security in mobile computing
    Yu, WJ
    Mok, AK
    PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS, 2002, : 312 - 317
  • [26] Security in mobile systems
    Subramanyam, V
    Joshi, A
    SEVENTEENTH IEEE SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, PROCEEDINGS, 1998, : 407 - 412
  • [28] Management of Security and Security for Management Systems
    Westphall, Carlos Becker
    Mueller, Peter
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2010, 18 (03) : 241 - 243
  • [29] Management of Security and Security for Management Systems
    Carlos Becker Westphall
    Peter Mueller
    Journal of Network and Systems Management, 2010, 18 : 241 - 243
  • [30] Security management for ad-hoc networked resource-limited mobile devices
    Sedov, I
    Speicher, S
    Cap, C
    VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 3262 - 3266