Jacques Mossière

Learn More
Arias is a system serviceee for distributed information systems , which provides low-level support for applications that make an intensive use of sharing and persistence. Arias is based on a persistent distributed shared memory that can be tailored and tuned according to the needs of the supported environment. This paper summarizes the basic design choices(More)
The purpose of the Guide project is to explore the use of shared objects for communication in a distributed system, especially for applications that require cooperative w ork. Since 1986, two prototypes have been implemented respectively on top of Unix (Guide-1) and Mach 3.0 (Guide-2). They have b e e n used for the development of distributed cooperative(More)
Software capabilities are a very convenient means to protect cooperating applications. They allow access rights to be dynamically exchanged between mutually suspicious interacting applications. However, in all the proposed approaches, capabilities are made available at the programming language level, requiring application developers to wire protection(More)
The appearance of 64 bit address space architectures (DEC Alpha, HP P/A RISC and MIPS R4000), has fostered interest in single address space operating systems. Examples of such implementations are Opal[Chase 1994], Angel[Murray 1993] and Mungi[Heiser 1993]. They all offer the following advantages:<ul><li> a virtual address is the universal means to reference(More)
Following the successful symposium at Middleware 2004, the 2nd International Middleware Doctoral Symposium took place at Middleware 2005. The symposium is a forum for an invited group of doctoral students; the students get to present their work, obtain guidance from mentors, and meet with their peers. The mentors are senior university or industry(More)
Following the successful symposium at Middleware 2004, the 2nd International Middleware Doctoral Symposium took place at Middleware 2005. The symposium is a forum for an invited group of doctoral students; the students get to present their work, obtain guidance from mentors, and meet with their peers. The mentors are senior university or industry(More)
This paper presents a protection model based on software capabilities. Its main advantage is that capabilities are hidden from the application programmer, allowing the protection policy of an application to be defined independently from the application code. This is very interesting for protecting an already developed application.Our claim is that this(More)
  • 1