Learn More
This report proposes a security model designed to support cooperative tasks in which the security of the information used and produced is critical, and where the participants in a task are not equally trusted. This approach will support a range of security policies, including those in which the rights of participants in cooperative tasks are restricted to(More)
Arias is a system serviceee for distributed information systems , which provides low-level support for applications that make an intensive use of sharing and persistence. Arias is based on a persistent distributed shared memory that can be tailored and tuned according to the needs of the supported environment. This paper summarizes the basic design choices(More)
This paper describes the main design principles of the multiaccess system ESOPE. Emphasis is placed on basic ideas underlying the design rather than on implementation details. The main features of the system include the ability given to any user to schedule his own parallel processes, using system primitive operations, and the allocation/scheduling policy,(More)
Software capabilities are a very convenient means to protect cooperating applications. They allow access rights to be dynamically exchanged between mutually suspicious interacting applications. However, in all the proposed approaches, capabilities are made available at the programming language level, requiring application developers to wire protection(More)
The purpose of the Guide project is to explore the use of shared objects for communication in a distributed system, especially for applications that require cooperative work. Since 1986, two prototypes have been implemented respectively on top of Unix (Guide-1) and Mach 3.0 (Guide-2). They have been used for the development of distributed cooperative(More)
The appearance of 64 bit address space architectures (DEC Alpha, HP P/A RISC and MIPS R4000), has fostered interest in single address space operating systems. Examples of such implementations are Opal[Chase 1994], Angel[Murray 1993] and Mungi[Heiser 1993]. They all offer the following advantages:<ul><li> a virtual address is the universal means to reference(More)
This paper describes a protection scheme for the Java environment. This scheme allows a programmer to specify the protection rights assigned to a class loaded from a remote site with respect to the local files. Protection is expressed in a high-level notation that extends the interface definition of the protected class. Protection is enforced by stubs that(More)
This paper presents a performance evaluation of the mobile agent paradigm in comparison to the client/server paradigm. This evaluation has been conducted on top of the Java environment, using respectively RMI, the Aglets mobile agents platform and a mobile agents prototype that we implemented. The measurements give the cost of the basic mechanisms involved(More)
Following the successful symposium at Middleware 2004, the 2nd International Middleware Doctoral Symposium took place at Middleware 2005. The symposium is a forum for an invited group of doctoral students; the students get to present their work, obtain guidance from mentors, and meet with their peers. The mentors are senior university or industry(More)