Mobile objects have gained a lot of attention in research and industry in the recent past, but th... more Mobile objects have gained a lot of attention in research and industry in the recent past, but they also have a long history. Security is one of the key requirements of mobile objects, and one of the most researched characteristics related to mobility. Resource management has been somewhat neglected in the past, but it is being increasingly addressed, in both the context of security and QoS. In this paper we place a few systems supporting mobile objects in perspective based upon how they address security and resource management.
... Popular Tags. Add a tag: No tags have been applied to this document. BibTeX | Add To MetaCart... more ... Popular Tags. Add a tag: No tags have been applied to this document. BibTeX | Add To MetaCart. @MISC{Bernadat98towardsa, author = {Philippe Bernadat and Dan Lambright and Franco ... 252, a nev/ kernel foundation for UNIX development Accetta, Baron, et al. - 1986. ...
In a distributed system, objects may migrate from one node to another for a variety of reasons. T... more In a distributed system, objects may migrate from one node to another for a variety of reasons. The new location may provide a more suitable computational environment, it may offer cheaper resources, or it may have data needed by the agent to satisfy its goals. The ability of an object to exist in a resource space that is not entirely dedicated to its own computation raises security concerns for the object itself, and raises performance and security concerns for the host environment. Individual objects or groups of objects may exhibit undesirable resource consumptive behavior. These reasons make it important to study ways of controlling resources used by mobile objects.
Mobile objects have gained a lot of attention in research and industry in the recent past, but th... more Mobile objects have gained a lot of attention in research and industry in the recent past, but they also have a long history. Security is one of the key requirements of mobile objects, and one of the most researched characteristics related to mobility. Resource management has been somewhat neglected in the past, but it is being increasingly addressed, in both the context of security and QoS. In this paper we place a few systems supporting mobile objects in perspective based upon how they address security and resource management. We start with the theoretical model of Actors that supports concurrent mobile objects in a programming environment. Then we describe task migration for the Mach microkernel, a case of mobile objects supported by an operating system. Using the OMG MASIF standard as an example, we then analyze middleware support for mobile objects. Mobile Objects and Agents (MOA) system, is an example of middleware level support based on Java. The active networks project, Conversant, supports object mobility at the communication protocol level. We summarize these projects, comparing their security and resource management, and conclude by deriving a few general observations on how security and resource management have been applied and how they might evolve in the future.
... Popular Tags. Add a tag: No tags have been applied to this document. BibTeX | Add To MetaCart... more ... Popular Tags. Add a tag: No tags have been applied to this document. BibTeX | Add To MetaCart. @MISC{Bernadat98towardsa, author = {Philippe Bernadat and Dan Lambright and Franco ... 252, a nev/ kernel foundation for UNIX development Accetta, Baron, et al. - 1986. ...
In a distributed system, objects may migrate from one node to another for a variety of reasons. T... more In a distributed system, objects may migrate from one node to another for a variety of reasons. The new location may provide a more suitable computational environment, it may offer cheaper resources, or it may have data needed by the agent to satisfy its goals. The ability of an object to exist in a resource space that is not entirely dedicated to its own computation raises security concerns for the object itself, and raises performance and security concerns for the host environment. Individual objects or groups of objects may exhibit undesirable resource consumptive behavior. These reasons make it important to study ways of controlling resources used by mobile objects.
Mobile objects have gained a lot of attention in research and industry in the recent past, but th... more Mobile objects have gained a lot of attention in research and industry in the recent past, but they also have a long history. Security is one of the key requirements of mobile objects, and one of the most researched characteristics related to mobility. Resource management has been somewhat neglected in the past, but it is being increasingly addressed, in both the context of security and QoS. In this paper we place a few systems supporting mobile objects in perspective based upon how they address security and resource management. We start with the theoretical model of Actors that supports concurrent mobile objects in a programming environment. Then we describe task migration for the Mach microkernel, a case of mobile objects supported by an operating system. Using the OMG MASIF standard as an example, we then analyze middleware support for mobile objects. Mobile Objects and Agents (MOA) system, is an example of middleware level support based on Java. The active networks project, Conversant, supports object mobility at the communication protocol level. We summarize these projects, comparing their security and resource management, and conclude by deriving a few general observations on how security and resource management have been applied and how they might evolve in the future.
... Popular Tags. Add a tag: No tags have been applied to this document. BibTeX | Add To MetaCart... more ... Popular Tags. Add a tag: No tags have been applied to this document. BibTeX | Add To MetaCart. @MISC{Bernadat98towardsa, author = {Philippe Bernadat and Dan Lambright and Franco ... 252, a nev/ kernel foundation for UNIX development Accetta, Baron, et al. - 1986. ...
In a distributed system, objects may migrate from one node to another for a variety of reasons. T... more In a distributed system, objects may migrate from one node to another for a variety of reasons. The new location may provide a more suitable computational environment, it may offer cheaper resources, or it may have data needed by the agent to satisfy its goals. The ability of an object to exist in a resource space that is not entirely dedicated to its own computation raises security concerns for the object itself, and raises performance and security concerns for the host environment. Individual objects or groups of objects may exhibit undesirable resource consumptive behavior. These reasons make it important to study ways of controlling resources used by mobile objects.
Mobile objects have gained a lot of attention in research and industry in the recent past, but th... more Mobile objects have gained a lot of attention in research and industry in the recent past, but they also have a long history. Security is one of the key requirements of mobile objects, and one of the most researched characteristics related to mobility. Resource management has been somewhat neglected in the past, but it is being increasingly addressed, in both the context of security and QoS. In this paper we place a few systems supporting mobile objects in perspective based upon how they address security and resource management. We start with the theoretical model of Actors that supports concurrent mobile objects in a programming environment. Then we describe task migration for the Mach microkernel, a case of mobile objects supported by an operating system. Using the OMG MASIF standard as an example, we then analyze middleware support for mobile objects. Mobile Objects and Agents (MOA) system, is an example of middleware level support based on Java. The active networks project, Conversant, supports object mobility at the communication protocol level. We summarize these projects, comparing their security and resource management, and conclude by deriving a few general observations on how security and resource management have been applied and how they might evolve in the future.
Mobile objects have gained a lot of attention in research and industry in the recent past, but th... more Mobile objects have gained a lot of attention in research and industry in the recent past, but they also have a long history. Security is one of the key requirements of mobile objects, and one of the most researched characteristics related to mobility. Resource management has been somewhat neglected in the past, but it is being increasingly addressed, in both the context of security and QoS. In this paper we place a few systems supporting mobile objects in perspective based upon how they address security and resource management.
... Popular Tags. Add a tag: No tags have been applied to this document. BibTeX | Add To MetaCart... more ... Popular Tags. Add a tag: No tags have been applied to this document. BibTeX | Add To MetaCart. @MISC{Bernadat98towardsa, author = {Philippe Bernadat and Dan Lambright and Franco ... 252, a nev/ kernel foundation for UNIX development Accetta, Baron, et al. - 1986. ...
In a distributed system, objects may migrate from one node to another for a variety of reasons. T... more In a distributed system, objects may migrate from one node to another for a variety of reasons. The new location may provide a more suitable computational environment, it may offer cheaper resources, or it may have data needed by the agent to satisfy its goals. The ability of an object to exist in a resource space that is not entirely dedicated to its own computation raises security concerns for the object itself, and raises performance and security concerns for the host environment. Individual objects or groups of objects may exhibit undesirable resource consumptive behavior. These reasons make it important to study ways of controlling resources used by mobile objects.
Mobile objects have gained a lot of attention in research and industry in the recent past, but th... more Mobile objects have gained a lot of attention in research and industry in the recent past, but they also have a long history. Security is one of the key requirements of mobile objects, and one of the most researched characteristics related to mobility. Resource management has been somewhat neglected in the past, but it is being increasingly addressed, in both the context of security and QoS. In this paper we place a few systems supporting mobile objects in perspective based upon how they address security and resource management. We start with the theoretical model of Actors that supports concurrent mobile objects in a programming environment. Then we describe task migration for the Mach microkernel, a case of mobile objects supported by an operating system. Using the OMG MASIF standard as an example, we then analyze middleware support for mobile objects. Mobile Objects and Agents (MOA) system, is an example of middleware level support based on Java. The active networks project, Conversant, supports object mobility at the communication protocol level. We summarize these projects, comparing their security and resource management, and conclude by deriving a few general observations on how security and resource management have been applied and how they might evolve in the future.
... Popular Tags. Add a tag: No tags have been applied to this document. BibTeX | Add To MetaCart... more ... Popular Tags. Add a tag: No tags have been applied to this document. BibTeX | Add To MetaCart. @MISC{Bernadat98towardsa, author = {Philippe Bernadat and Dan Lambright and Franco ... 252, a nev/ kernel foundation for UNIX development Accetta, Baron, et al. - 1986. ...
In a distributed system, objects may migrate from one node to another for a variety of reasons. T... more In a distributed system, objects may migrate from one node to another for a variety of reasons. The new location may provide a more suitable computational environment, it may offer cheaper resources, or it may have data needed by the agent to satisfy its goals. The ability of an object to exist in a resource space that is not entirely dedicated to its own computation raises security concerns for the object itself, and raises performance and security concerns for the host environment. Individual objects or groups of objects may exhibit undesirable resource consumptive behavior. These reasons make it important to study ways of controlling resources used by mobile objects.
Mobile objects have gained a lot of attention in research and industry in the recent past, but th... more Mobile objects have gained a lot of attention in research and industry in the recent past, but they also have a long history. Security is one of the key requirements of mobile objects, and one of the most researched characteristics related to mobility. Resource management has been somewhat neglected in the past, but it is being increasingly addressed, in both the context of security and QoS. In this paper we place a few systems supporting mobile objects in perspective based upon how they address security and resource management. We start with the theoretical model of Actors that supports concurrent mobile objects in a programming environment. Then we describe task migration for the Mach microkernel, a case of mobile objects supported by an operating system. Using the OMG MASIF standard as an example, we then analyze middleware support for mobile objects. Mobile Objects and Agents (MOA) system, is an example of middleware level support based on Java. The active networks project, Conversant, supports object mobility at the communication protocol level. We summarize these projects, comparing their security and resource management, and conclude by deriving a few general observations on how security and resource management have been applied and how they might evolve in the future.
... Popular Tags. Add a tag: No tags have been applied to this document. BibTeX | Add To MetaCart... more ... Popular Tags. Add a tag: No tags have been applied to this document. BibTeX | Add To MetaCart. @MISC{Bernadat98towardsa, author = {Philippe Bernadat and Dan Lambright and Franco ... 252, a nev/ kernel foundation for UNIX development Accetta, Baron, et al. - 1986. ...
In a distributed system, objects may migrate from one node to another for a variety of reasons. T... more In a distributed system, objects may migrate from one node to another for a variety of reasons. The new location may provide a more suitable computational environment, it may offer cheaper resources, or it may have data needed by the agent to satisfy its goals. The ability of an object to exist in a resource space that is not entirely dedicated to its own computation raises security concerns for the object itself, and raises performance and security concerns for the host environment. Individual objects or groups of objects may exhibit undesirable resource consumptive behavior. These reasons make it important to study ways of controlling resources used by mobile objects.
Mobile objects have gained a lot of attention in research and industry in the recent past, but th... more Mobile objects have gained a lot of attention in research and industry in the recent past, but they also have a long history. Security is one of the key requirements of mobile objects, and one of the most researched characteristics related to mobility. Resource management has been somewhat neglected in the past, but it is being increasingly addressed, in both the context of security and QoS. In this paper we place a few systems supporting mobile objects in perspective based upon how they address security and resource management. We start with the theoretical model of Actors that supports concurrent mobile objects in a programming environment. Then we describe task migration for the Mach microkernel, a case of mobile objects supported by an operating system. Using the OMG MASIF standard as an example, we then analyze middleware support for mobile objects. Mobile Objects and Agents (MOA) system, is an example of middleware level support based on Java. The active networks project, Conversant, supports object mobility at the communication protocol level. We summarize these projects, comparing their security and resource management, and conclude by deriving a few general observations on how security and resource management have been applied and how they might evolve in the future.
Uploads
Papers by Dan Lambright