SHAP — Secure Hardware Agent Platform

نویسندگان

  • Martin Zabel
  • Thomas B. Preußer
  • Peter Reichel
  • Rainer G. Spallek
چکیده

This paper presents a novel implementation of an embedded Java microarchitecture for secure, realtime, and multi-threaded applications. Together with the support of modern features of object-oriented languages, such as exception handling, automatic garbage collection and interface types, a general-purpose platform is established which also fits for the agent concept. Especially, considering real-time issues, new techniques have been implemented in our Java microarchitecture, such as an integrated stack and thread management for fast context switching, concurrent garbage collection for real-time threads and autonomous control flows through preemptive round-robin scheduling.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Authentication Using Certificate Revocation List (Crl) and Message Signature in Vanet

A vehicular ad hoc network (VANETs) provides the security through the Public Key Infrastructure (PKI) and Certificate Revocation Lists (CRLs). In any PKI system, the signature of sender and certificate should be verified in CRL list. Also verifying the certificate of the sender then authentication is provided to received message. In this paper, secure hash authentication protocol (SHAP) verifie...

متن کامل

SMASH: Modular Security for Mobile Agents TR-UTEDGE-2006-007

Mobile agent systems of the future will be used for secure information delivery and retrieval, off-line searching and purchasing, and even system software updates. As part of such applications, agent and platform integrity must be maintained, confidentiality between agents and the intended platform parties must be preserved, and accountability of agents and their platform counterparts must be s...

متن کامل

An Overview of SECMAP Secure Mobile Agent Platform

Mobile agent technology presents an attractive alternative to the client-server paradigm; however, the lack of a feasible agent security model seriously hinders the adoption of the agent paradigm. This paper describes a mobile agent platform, Secure Mobile Agent Platform (SECMAP) and its security infrastructure. SECMAP presents abstractions which ensure the protection of agents and system compo...

متن کامل

A Secure Communication Framework for Mobile Agents

Communication, a fundamental concept in computing, allows two pieces of software to interact and to exchange information. It is an important aspect of mobile agent systems because mobile agents generally need to coordinate their activities through some type of communication. Using mobile agent technologies provides potential benefits to distributed applications; however, an agent’s ability to m...

متن کامل

Analysis of the Intel Pentium's Ability to Support a Secure Virtual Machine Monitor

A virtual machine monitor (VMM) allows multiple operating systems to run concurrently on virtual machines (VMs) on a single hardware platform. Each VM can be treated as an independent operating system platform. A secure VMM would enforce an overarching security policy on its VMs. The potential benefits of a secure VMM for PCs include: a more secure environment, familiar COTS operating systems a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007