Skip to main content

Security and communication in mobile object systems

  • Conference paper
  • First Online:
Mobile Object Systems Towards the Programmable Internet (MOS 1996)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1222))

Included in the following conference series:

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. B. Bershad, S. Savage, P. Pardyak, E. G. Sirer, D. Becker, M. Fiuczynski, C. Chambers, and S. Eggers. Extensibility, Safety and Performance in the SPIN Operating System. In Proceedings of the 15th ACM Symposiumon Operating Systems Principles (SOSP-15), pages 267–284, Coppper Mountain, CO, 1996.

    Google Scholar 

  2. K. A. Bharat and L. Cardelli. Migratory applications. In Proceedings of ACM Symposium on User Interface Software and Technology '95, Pittsburgh, PA, Nov. 1995.

    Google Scholar 

  3. A. Black, N. Hutchinson, E. Jul, H. Levy, and L. Carter. Distribution and abstract types in Emerald. IEEE Trans. Softw. Eng., 13(1):65–76, Jan. 1987.

    Google Scholar 

  4. A. C. Bomberger, A. P. Frantz, W. S. Frantz, A. C. Hardy, N. Hardy, C. R. Landau, and J. S. Shapiro. The KeyKos nanokernel architecture. In Proceedings of the USENIX Workshop on Micro-Kernels and Other Kernel Architectures, pages 95–112. USENIX Association, April 1992.

    Google Scholar 

  5. L. Cardelli. Mobile computation. Position paper, Digital SRC, 1996.

    Google Scholar 

  6. J. S. Chase, H. M. Levy, M. J. Feeley, and E. D. Lazowska. Sharing and protection in a single address space operating system. ACM Transaction on Computer Systems, May 1994.

    Google Scholar 

  7. D. Chess, B. Grosof, and C. Harrison. Itinerant agents for mobile computing. IEEE Personal Communications, 2(4):34–49, Oct. 1995.

    Google Scholar 

  8. P. Ciancarini and D. Rossi: Jada: coordination and communication for Java agents. In [42].

    Google Scholar 

  9. D. Dean. The security of static typing with dynamic linking. In Fourth ACM Conference on Computer and Communications Security, Zurich, April 1997.

    Google Scholar 

  10. D. Dean, E. W. Felten, and D. S. Wallach. Java security: From Hotjava to Netscape and beyond. In 1996 IEEE Symposium on Security and Privacy, Oakland, CA, May 1996. IEEE, IEEE.

    Google Scholar 

  11. D. Denning and P. Denning. Certification of programs for secure information flow. Communications of the ACM, 20(7):504–513, July 1977.

    Google Scholar 

  12. A. Farkas and A. Dearle. Octopus: A reflective language mechanism for object manipulation. In Proceedings of the Fourth International Workshop on Database Programming Languages, Lecture Notes in Computer Science. Springer-Verlag, 1993.

    Google Scholar 

  13. A. Farkas and A. Dearle. The Octopus model and its implementation. Australian Computer Science Communications, 16(1), 1994.

    Google Scholar 

  14. A. O. Freier, P. Karlton, and P. C. Kocher. The SSL protocol (version 3.0). Technical report, Netscape Communication Corporation, Mar. 1996.

    Google Scholar 

  15. D. Gelernter. Linda in context. Commun. ACM, 32(4), Apr. 1989.

    Google Scholar 

  16. I. Goldberg, D. Wagner, R. Thomas, and E. A. Brewer. A secure environment for untrusted helper applications: Confining the wily hacker. In The Sixth USENIX Security Symposium Proceedings, pages 1–13, San Jose, California, July 1996. The Usenix Association.

    Google Scholar 

  17. T. Goldstein. The gateway security model in the Java electronic commerce framework. White paper, Sun Microsystems Laboratories / Javasoft, Decemeber 1996.

    Google Scholar 

  18. R. S. Gray. Agent tcl: A flexible and secure mobile-agent system. In Proceedings of the Fourth Annual Tcl/Tk Workshop, pages 9–23, 1996.

    Google Scholar 

  19. D. Hagimont, S. Krakowiak, J. Mossière, and X. R. de Pina. A selective protection scheme for the Java environment. Technical Report RT-Sirac-96-12, SIRAC, 1996.

    Google Scholar 

  20. B. Hailpern and H. Ossher. Extending object to support multiple interface and access control. IEEE Transaction on Software Engineering, 16(11): 1247–1257, November 1990.

    Google Scholar 

  21. T. Jaeger, A. D. Rubin, and A. Prakash. Building systems that flexibly control downloaded executable content. In The Sixth USENIX Security Symposium Proceedings, pages 131–148, San Jose, California, July 1996. The Usenix Association.

    Google Scholar 

  22. M. D. LaDue. Hostile applets on the horizon. 1996.

    Google Scholar 

  23. J. Lepreau, B. Ford, and M. Hibler. The persistent relevance of the local operating system to global applications. In Proceedings of the 1996 SIGOPS European Workshop, 1996.

    Google Scholar 

  24. B. Liskov, A. Adya, M. Castro, M. Day, S. Ghemawat, R. Gruber, U. Maheshwari, A. Myers, and L. Shrira. Safe and efficient sharing of persistent objects in thor. In Proceedings of SIGMOD '96, Montreal, Canada, June 1996.

    Google Scholar 

  25. C.V. Lopes. Adaptive parameter passing. In Symposium on Object Technologies for Advanced Software (ISOTAS'96), volume 1049 of Lecture Notes in Computer Science, Konazawa, Japan, March 1996. Springer-Verlag.

    Google Scholar 

  26. D. Maier, J. Stein, A. Otis, and A. Purdy. Development of an object-oriented DBMS. In OOPSLA'86 Conference Proceedings, pages 472–482, Portland, OR, September 1986. ACM.

    Google Scholar 

  27. S. Matsuoka and S. Kawai. Using tuple space communication in distributed object-oriented languages. In OOPSLA'88 Proceedings, pages 276–284, Sept. 1988.

    Google Scholar 

  28. Y. Minsky, R. van Renesse, F. B. Schneider, and S. D. Stoller. Cryptographic support for fault-tolerant distributed computing. In Proceedings of the 1996 SIGOPS European Workshop, July 1996.

    Google Scholar 

  29. R. Morrison, A. Brown, R. Connor, Q. I. Cutts, G. Kirby, A. Dearle, J. Rosenberg, and D. Stemple. Protection in Persistent Object Systems, In Security and Persistence, pages 48–66. Springer-Verlag, 1990.

    Google Scholar 

  30. George C. Necula. Proof-carrying code. In 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Language (POPL'97), pages 106–119, Paris, France, January 1997.

    Google Scholar 

  31. B. C. Neuman. Proxy-based authorization and accounting for distributed systems. In Procceedings of the 13th International Conference on Distributed Systems, Pittsburgh, PA, May 1993.

    Google Scholar 

  32. M. Ranganathan, A. Acharya, S. Sharma, and J. Saltz. Network-aware mobile programs. Research report, University of Maryland, 1996.

    Google Scholar 

  33. R. Riggs, A. Wolrath, J. Waldo, and K. Bharat. Pickling state in the java. In The Second Conference on Object-Oriented Technologies and Systems (COOTS) Procedings, pages 241–250, Toronto, Canada, June 1996. USENIX Press.

    Google Scholar 

  34. F. Rouaix. A Web navigator with applets in Caml. In Fifth WWW Conference, Paris, France, May 1996.

    Google Scholar 

  35. A. Rudloff, F. Matthes, and J. Schmidt. Security as an add-on quality in persistent object systems. In Second International East/West Database Workshop, Workshops in Computing, pages 90–108, Klagenfurt, Austria, 1995. Springer-Verlag.

    Google Scholar 

  36. M. Mira da Silva: Mobility and Persistence. In [42].

    Google Scholar 

  37. A. S. Tanenbaum, S. J. Mullender, and R. van Renesse. Using sparse cabilities in a distributed operating system. In Proceedings Sixth International Conference on Distributed Computer Systems. IEEE, 1986.

    Google Scholar 

  38. A.S. Tanenbaum, editor, Report of the Seventh ACM SIGOPS European Workshop, Connemara, Ireland, 9–11 Sepetember 1996.http://www.cs.vu.nl/∼ast/

    Google Scholar 

  39. L. Tang and S. Low. Chrg-http: A tool for micropayments on the World Wide Web. In The Sixth USENIX Security Symposium Proceedings, pages 123–129. The Usenix Association, July 1996.

    Google Scholar 

  40. J. Tardo and L. Valente. Mobile Agent Security. In Proceedings of the 41th International Conference of the IEEE Computer Society (CompCon'96), February 1996.

    Google Scholar 

  41. C.-R. Tsai V. D. Gligor and C. S. Chandersekaran. On the identification of covert storage channels in secure systems. IEEE Transactions on Software Engineering, 16(6):569–580, June 1990.

    Google Scholar 

  42. J. Vitek, C. Tschudin, (eds): Mobile Object System: A first look at mobile object-oriented programs, Springer-Verlag, 1997.

    Google Scholar 

  43. D. Volpano. Provably-secure programming languages for remote evaluation. ACM Computing Surveys, 28A(2):electronic, December 1996.

    Google Scholar 

  44. D. Volpano and G. Smith. On the systematic design of web languages. ACM Computing Surveys, 28(2):315–317, June 1996.

    Google Scholar 

  45. D. Volpano and G. Smith. A type-based approach to program security. In 7th Int'l Joint Conference on the Theory and Practice of Software Development, April 1997.

    Google Scholar 

  46. D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. Journal of Computer Security, 28(2): 1–21, 1996.

    Google Scholar 

  47. R. Wahbe, S. Lucco, T. E. Anderson, and S. L. Graham. Efficient software-based fault isolation. In Proceedings of the Symposium on Operating Systems Principles, 1993.

    Google Scholar 

  48. K. M. Walker, D. F. Stern, L. Badger, K. A. Oosendorp, M. J. Petkac, and D. L. Sherman. Confining root programs with domain and type enforcement (dte). In The Sixth USENIX Security Symposium Proceedings, pages 21–36. The Usenix Association, July 1996.

    Google Scholar 

  49. J. E. White. Telescript Technology: The foundation for the electronic marketplace. General Magic White Paper, General Magic, Inc. 1994.

    Google Scholar 

  50. A. Wolrath, R. Riggs, and J. Waldo. A distributed object model for the Java system. In The Second Conference on Object-Oriented Technologies and Systems (COOTS) Procedings, pages 219–231, Toronto, Canada, June 1996. USENIX Press.

    Google Scholar 

  51. C. Yoshikawa, B. Chun, and D. Culler. Web graffiti & high bandwirth covert channels using java. January 1997.

    Google Scholar 

  52. C. F. Yu and V. D. Gligor. A specification and verification method for preventing denial of service. IEEE Transactions on Software Engineering, 16(6):581–595, June 1990.

    Google Scholar 

Download references

Authors

Editor information

Jan Vitek Christian Tschudin

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Vitek, J., Serrano, M., Thanos, D. (1997). Security and communication in mobile object systems. In: Vitek, J., Tschudin, C. (eds) Mobile Object Systems Towards the Programmable Internet. MOS 1996. Lecture Notes in Computer Science, vol 1222. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-62852-5_14

Download citation

  • DOI: https://doi.org/10.1007/3-540-62852-5_14

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-62852-1

  • Online ISBN: 978-3-540-68705-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics