XKlaim and Klava: Programming Mobile Code

نویسندگان

  • Lorenzo Bettini
  • Rocco De Nicola
  • Rosario Pugliese
چکیده

Highly distributed networks have now become a common infrastructure for a new kind of wide-area distributed applications whose key design principle is network awareness, namely the ability to deal with dynamic changes of the network environment. Network-aware computing has called for new programming languages that exploit the mobility paradigm as the basic interaction mechanism. In this paper we present the Klaim (Kernel Language for Agent Interaction and Mobility) framework for programming mobile code applications, namely the X-Klaim programming language and the Java-based run-time system Klava. In particular, we illustrate how Klava handles mobile code. Finally, an example is shown that is implemented using this framework.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Klava: a Java package for distributed and mobile applications

public void execute() throws KlavaException This method will be invoked when a process is executed (just like run for threads). A process must be executed within a node, which will be its execution environment. KlavaProcess also offers all the methods to access tuple spaces; these methods transparently call the corresponding methods of the class NetNode. In the new hierarchical model of KLAIM, ...

متن کامل

Aggrandizing the beast's limbs: patulous code reuse attack on ARM architecture

Since smartphones are usually personal devices full of private information, they are a popular target for a vast variety of real-world attacks such as Code Reuse Attack (CRA). CRAs enable attackers to execute any arbitrary algorithm on a device without injecting an executable code. Since the standard platform for mobile devices is ARM architecture, we concentrate on available ARM-based CRAs. Cu...

متن کامل

An Overview on Mobile Code Security

Mobile code technology offers significant benefits that enhance cross-platform capabilities, system automation, and resource sharing while creating a plethora of security risks. Security is the precondition to universal reception of mobile code systems. In this survey, we provide a general overview of the mobile code security field by presenting several current and envisioned applications of mo...

متن کامل

Dwarf Frankenstein is still in your memory: tiny code reuse attacks

Code reuse attacks such as return oriented programming and jump oriented programming are the most popular exploitation methods among attackers. A large number of practical and non-practical defenses are proposed that differ in their overhead, the source code requirement, detection rate and implementation dependencies. However, a usual aspect among these methods is consideration of the common be...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Electr. Notes Theor. Comput. Sci.

دوره 62  شماره 

صفحات  -

تاریخ انتشار 2001