Jacques Mossière

Learn More
The purpose of the Guide project is to explore the use of shared objects for communication in a distributed system, especially for applications that require cooperative work. Since 1986, two prototypes have been implemented respectively on top of Unix (Guide-1) and Mach 3.0 (Guide-2). They have been used for the development of distributed cooperative(More)
Software capabilities are a very convenient means to protect co-operating applications. They allow access rights to be dynamically exchanged between mutually suspicious interacting applications. However, in all the proposed approaches, capabilities are made available at the programming language level, requiring application developers to wire protection(More)
Arias is a system serviceee for distributed information systems , which provides low-level support for applications that make an intensive use of sharing and persistence. Arias is based on a persistent distributed shared memory that can be tailored and tuned according to the needs of the supported environment. This paper summarizes the basic design choices(More)
This paper describes the main design principles of the multiaccess system ESOPE. Emphasis is placed on basic ideas underlying the design rather than on implementation details. The main features of the system include the ability given to any user to schedule his own parallel processes, using system primitive operations, and the allocation/scheduling policy,(More)
This report proposes a security model designed to support cooperative tasks in which the security of the information used and produced is critical, and where the participants in a task are not equally trusted. This approach will support a range of security policies, including those in which the rights of participants in cooperative tasks are restricted to(More)
The appearance of 64 bit address space architectures (DEC Alpha, HP P/A RISC and MIPS R4000), has fostered interest in single address space operating systems. Examples of such implementations are Opal[Chase 1994], Angel[Murray 1993] and Mungi[Heiser 1993]. They all offer the following advantages:<ul><li> a virtual address is the universal means to reference(More)
This paper presents a performance evaluation of the mobile agent paradigm in comparison to the client/server paradigm. This evaluation has been conducted on top of the Java environment, using respectively RMI, the Aglets mobile agents platform and a mobile agents prototype that we implemented. The measurements give the cost of the basic mechanisms involved(More)
This paper presents a protection model based on software capabilities. Its main advantage is that capabilities are hidden from the application programmer, allowing the protection policy of an application to be defined independently from the application code. This is very interesting for protecting an already developed application.Our claim is that this(More)
Object migration is a strong requirement for distributed persistent object stores. The purpose of object migration is not only to allow disk location modification for objects managed in the permanent store, but it is also often used as a means for gathering objects in some partitions also called clusters, in order to improve object management at the system(More)