Advertisement

Using a Secure Java Micro-kernel on Embedded Devices for the Reliable Execution of Dynamically Uploaded Applications

  • Walter Binder
  • Balázs Lichtl
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2361)

Abstract

This paper presents the architecture of an autonomous, multipurpose station, which executes dynamically uploaded applications. The station hardware is based on an embedded Java processor, which runs the system software and applications. The system software is built on top of a flexible, lightweight, efficient, and secure mobile object platform, which is able to receive mobile code and to execute it, while protecting the station from faulty applications. Mobile code is used for application upload, as well as for remote configuration and maintenance of the autonomous station. Applications executing on the station may be charged for their resource consumption. This paper also outlines an initial application of the autonomous station, which has been recently deployed in a pilot project.

Keywords

Mobile Agent Communication Module Power Supply System Mobile Object Device Driver 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    3GPP. 3GPP Specifications Home Page. Web pages at http://www.3gpp.org/specs/specs.htm.
  2. 2.
    G. Back, W. Hsieh, and J. Lepreau. Processes in KaffeOS: Isolation, resource management, and sharing in Java. In Proceedings of the Fourth Symposium on Operating Systems Design and Implementation (OSDI’2000), San Diego, CA, USA, Oct. 2000.Google Scholar
  3. 3.
    W. Binder. Design and implementation of the J-SEAL2 mobile agent kernel. In The 2001 Symposium on Applications and the Internet (SAINT-2001), San Diego, CA, USA, Jan. 2001.Google Scholar
  4. 4.
    W. Binder, J. Hulaas, A. Villazón, and R. Vidal. Portable resource control in Java: The J-SEAL2 approach. In ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA-2001), Tampa Bay, Florida, USA, Oct. 2001.Google Scholar
  5. 5.
    W. Binder and V. Roth. Secure mobile agent systems using Java: Where are we heading? In Seventeenth ACM Symposium on Applied Computing (SAC-2002), Madrid, Spain, Mar. 2002.Google Scholar
  6. 6.
    G. Bollella, B. Brosgol, P. Dibble, S. Furr, J. Gosling, D. Hardin, and M. Turnbull. The Real-Time Specification for Java. Addison-Wesley, Reading, MA, USA, 2000.Google Scholar
  7. 7.
    C. Bryce and J. Vitek. The JavaSeal mobile agent kernel. In First International Symposium on Agent Systems and Applications (ASA’99)/Third International Symposium on Mobile Agents (MA’99), Palm Springs, CA, USA, Oct. 1999.Google Scholar
  8. 8.
    G. Czajkowski and L. Daynes. Multitasking without compromise: A virtual machine evolution. In ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA’01), Tampa Bay, Florida, Oct. 2001.Google Scholar
  9. 9.
    J. Gosling, B. Joy, G. L. Steele, and G. Bracha. The Java language specification. Java series. Addison-Wesley, Reading, MA, USA, second edition, 2000.Google Scholar
  10. 10.
    R. N. Horspool and J. Corless. Tailored compression of Java class files. Software Practice and Experience, 28(12):1253–1268, Oct. 1998.Google Scholar
  11. 11.
    Java Community Process. JSR-000030 J2ME Connected, Limited Device Configuration. Web pages at http://jcp.org/aboutJava/communityprocess/final/jsr030/index.html.
  12. 12.
    Java Community Process. JSR-000036 J2ME Connected Device Configuration. Web pages at http://jcp.org/aboutJava/communityprocess/final/jsr036/index.html.
  13. 13.
    Java Community Process. JSR 121-Application Isolation API Specification. Web pages at http://jcp.org/jsr/detail/121.jsp.
  14. 14.
    T. Lindholm and F. Yellin. The Java Virtual Machine Specification. Addison-Wesley, Reading, MA, USA, second edition, 1999.Google Scholar
  15. 15.
    J. Postel. RFC 768: User Datagram Protocol, Aug. 1980.Google Scholar
  16. 16.
    J. Postel. RFC 791: Internet Protocol, Sept. 1981.Google Scholar
  17. 17.
    J. Postel. RFC 793: Transmission Control Protocol, Sept. 1981.Google Scholar
  18. 18.
    W. Simpson. RFC 1661: The point-to-point protocol (PPP), July 1994.Google Scholar
  19. 19.
    S. T. Taft. Programming the Internet in Ada 95. Lecture Notes in Computer Science, 1088:1–16, 1996.Google Scholar
  20. 20.
    A. Villazón and W. Binder. Portable resource reification in Java-based mobile agent systems. In Fifth IEEE International Conference on Mobile Agents (MA-2001), Atlanta, Georgia, USA, Dec. 2001.Google Scholar
  21. 21.
    J. Vitek and G. Castagna. Seal: A framework for secure mobile computations. In Internet Programming Languages, 1999.Google Scholar
  22. 22.
    F. Yellin. Low level security in Java. In Fourth International Conference on the World-Wide Web, MIT, Boston, USA, Dec. 1995.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2002

Authors and Affiliations

  • Walter Binder
    • 1
  • Balázs Lichtl
    • 1
  1. 1.CoCo Software Engineering GmbHViennaAustria

Personalised recommendations