Open Systems Laboratory at Illinois

Case studies in security and resource management for mobile objects

By Dejan S. Milojicic, Gul Agha, Philippe Bernadat, Deepika Chauhan, Shai Guday, Nadeem Jamali, and Dan Lambright. In ECOOP Workshops, volume 1543 of Lecture Notes in Computer Science, 306. Springer, 1998.

Publisher Link:
http://dx.doi.org/10.1007/3-540-49255-0_83

Abstract

In a distributed system, objects may migrate from one node to another for a variety of reasons. The new location may provide a more suitable computational environment, it may offer cheaper resources, or it may have data needed by the agent to satisfy its goals. The ability of an object to exist in a resource space that is not entirely dedicated to its own computation raises security concerns for the object itself, and raises performance and security concerns for the host environment. Individual objects or groups of objects may exhibit undesirable resource consumptive behavior. These reasons make it important to study ways of controlling resources used by mobile objects.

BibTeX

@inproceedings{conf/ecoopw/MilojicicABCGJL98,
    author = "Milojicic, Dejan S. and Agha, Gul and Bernadat,
              Philippe and Chauhan, Deepika and Guday, Shai and Jamali, Nadeem
              and Lambright, Dan",
    editor = "Demeyer, Serge and Bosch, Jan",
    title = "Case Studies in Security and Resource Management for
             Mobile Objects",
    booktitle = "ECOOP Workshops",
    crossref = "conf/ecoopw/1998",
    ee = "http://dx.doi.org/10.1007/3-540-49255-0_83",
    pages = "306",
    year = "1998",
}

@proceedings{conf/ecoopw/1998,
    editor = "Demeyer, Serge and Bosch, Jan",
    title = "Object-Oriented Technology, ECOOP'98 Workshop Reader,
             ECOOP'98 Workshops, Demos, and Posters, Brussels, Belgium,
             July 20-24, 1998, Proceedings",
    isbn = "3-540-65460-7",
    publisher = "Springer",
    series = "Lecture Notes in Computer Science",
    volume = "1543",
    year = "1998",
}