Persistence and Security Support for Distributed Systems with Mobile Software Objects Position Paper

نویسندگان

  • Boris Lavva
  • Israel Ben-Shaul
  • Ophir Holder
چکیده

Mobile software objects are autonomous computational entities that travel in large-scale and widely-distributed heterogeneous systems, and whose functionality can be attached to diverse computing environments. Incorporation of mobile objects into large-scale distributed systems introduces new challenges to distributed object management (sub)system (DOMS). In this paper we focus on two important aspects of DOMS for mobile objects, persistence and security. The gist of our approach is to enable objects to determine and set the policies governing their own persistence and security, coupled with infrastructure-level mechanisms for managing the persistent store and enforcing the security policies. This approach is embodied in the Hadas object manager, which is fully implemented in Java and utilizes Java's serialization and security manager for persistence and security, respectively.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Object management for network-centric systems with mobile objects

Mobile software objects are computational entities that travel in large-scale and widely-distributed heterogeneous systems, and whose functionality can be attached to diverse computing environments. When employed over decentralized sites with operational and administrative autonomy, support for mobility raises difficult issues with respect to object management services. In particular, it impact...

متن کامل

Architectural Support for Mobile Objects in Large Scale Distributed Systems

The paper discusses the relevant features of an object support system that provides basic facilities for building flexible distributed applications in environments where objects can be mobile and occasional failures (node crashes, real or virtual network partitions) are possible. These facilities are for naming, locating and invoking objects, persistence and garbage collection. One of the key f...

متن کامل

Fabric: Building open distributed systems securely by construction

Distributed information systems are prevalent in modern computing but difficult to build securely. Because systems commonly span domains of trust, host nodes share data and code of varying degrees of trustworthiness. Modern systems are often open and extensible, making security even harder to reason about. Unfortunately, standard methods for software construction do not help programmers enough ...

متن کامل

Agent Approaches to Role-Based Security Agent Approaches to Enforce Role-Based Security in Distributed and Web-Based Computing*

In the age of information technology, organizations of all types are seeking to effectively utilize and disseminate information, by designing and developing dependable and secure distributed computing environments that allow existing and future systems to inter-operate. While many existing access control approaches (mandatory, discretionary, and role-based) can be leveraged for the support of s...

متن کامل

The Agent Pattern for Mobile Agent Systems

This paper presents the Agent pattern, a design pattern useful to develop dynamic and distributed applications. The Agent pattern provides a clean and easy way to develop agent-based applications, mainly in open and large-scale distributed environments such as the Internet and application areas such as Electronic Commerce. The Agent pattern encapsulates a business specific class (a specializati...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997