Persistence and Security Support for Distributed Systems with Mobile Software Objects Position Paper
نویسندگان
چکیده
Mobile software objects are autonomous computational entities that travel in large-scale and widely-distributed heterogeneous systems, and whose functionality can be attached to diverse computing environments. Incorporation of mobile objects into large-scale distributed systems introduces new challenges to distributed object management (sub)system (DOMS). In this paper we focus on two important aspects of DOMS for mobile objects, persistence and security. The gist of our approach is to enable objects to determine and set the policies governing their own persistence and security, coupled with infrastructure-level mechanisms for managing the persistent store and enforcing the security policies. This approach is embodied in the Hadas object manager, which is fully implemented in Java and utilizes Java's serialization and security manager for persistence and security, respectively.
منابع مشابه
Object management for network-centric systems with mobile objects
Mobile software objects are computational entities that travel in large-scale and widely-distributed heterogeneous systems, and whose functionality can be attached to diverse computing environments. When employed over decentralized sites with operational and administrative autonomy, support for mobility raises difficult issues with respect to object management services. In particular, it impact...
متن کاملArchitectural Support for Mobile Objects in Large Scale Distributed Systems
The paper discusses the relevant features of an object support system that provides basic facilities for building flexible distributed applications in environments where objects can be mobile and occasional failures (node crashes, real or virtual network partitions) are possible. These facilities are for naming, locating and invoking objects, persistence and garbage collection. One of the key f...
متن کاملFabric: Building open distributed systems securely by construction
Distributed information systems are prevalent in modern computing but difficult to build securely. Because systems commonly span domains of trust, host nodes share data and code of varying degrees of trustworthiness. Modern systems are often open and extensible, making security even harder to reason about. Unfortunately, standard methods for software construction do not help programmers enough ...
متن کاملAgent Approaches to Role-Based Security Agent Approaches to Enforce Role-Based Security in Distributed and Web-Based Computing*
In the age of information technology, organizations of all types are seeking to effectively utilize and disseminate information, by designing and developing dependable and secure distributed computing environments that allow existing and future systems to inter-operate. While many existing access control approaches (mandatory, discretionary, and role-based) can be leveraged for the support of s...
متن کاملThe Agent Pattern for Mobile Agent Systems
This paper presents the Agent pattern, a design pattern useful to develop dynamic and distributed applications. The Agent pattern provides a clean and easy way to develop agent-based applications, mainly in open and large-scale distributed environments such as the Internet and application areas such as Electronic Commerce. The Agent pattern encapsulates a business specific class (a specializati...
متن کامل