Advertisement

Middleware Support for Resource-Constrained Software Deployment

  • Nicolas Le Sommer
  • Frédéric Guidec
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2893)

Abstract

The Jamus platform is dedicated to providing a safe runtime environment for untrusted Java application programs, while offering each of these programs access to the resources it needs to use at runtime. To achieve this goal, Jamus implements a contractual approach of resource utilisation and control, together with a reservation-based resource management scheme, and a monitoring model. When getting deployed on the platform, a candidate program must first subscribe a contract with the resource manager of the platform. This contract describes the resources the program requires to be able to access at runtime, and how it plans to behave when accessing these resources. Based on this information, the platform can monitor programs at runtime, so that any violation of the contracts they subscribed can be detected and sanctioned. Moreover, since the specific needs of a program are liable to change (or to be refined) dynamically while this program is running, any program hosted by the platform can ask that its contract be re-negotiated at any time.

References

  1. 1.
    Back, G., Hsieh, W.C., Lepreau, J.: Processes in KaffeOS: Isolation, Resource Management, and Sharing in Java. In: The 4th Symposium on Operating Systems Design and Implementation (October 2000)Google Scholar
  2. 2.
    Back, G., Tullmann, P., Stoller, L., Hsieh, W.C., Lepreau, J.: Techniques for the Design of Java Operating Systems. In: USENIX Annual Technical Conference (June 2000)Google Scholar
  3. 3.
    Beugnard, A., Jézéquel, J.-M., Plouzeau, N., Watkins, D.: Making components contract-aware. In: IEEE (ed.) Computer, June 1999, pp. 38–44. IEEE, Los Alamitos (1999)Google Scholar
  4. 4.
    Czajkowski, G., von Eicken, T.: JRes: a Resource Accounting Interface for Java. In: ACM OOPSLA Conference (1998)Google Scholar
  5. 5.
    Evans, D., Twyman, A.: Flexible Policy-Directed Code Safety. In: IEEE Security and Privacy (May 1999)Google Scholar
  6. 6.
    Gong, L.: Java Security: Present and Near Future. IEEE Micro, 14–19 (May 1997)Google Scholar
  7. 7.
    Gong, L., Schemers, R.: Implementing Protection Domains in the Java Development Kit 1.2. In: Internet Society Symposium on Network and Distributed System Scurity (March 1998)Google Scholar
  8. 8.
    Guidec, F., Le Sommer, N.: Towards Resource Consumption Accounting and Control in Java: a Practical Experience. In: ECOOP 2002 (Workshop on Resource Management for Safe Languages) (2002) (to be published)Google Scholar
  9. 9.
    Pandey, R., Hashii, B.: Providing Fine-Grained Access Control for Java Programs. In: Guerraoui, R. (ed.) ECOOP 1999. LNCS, vol. 1628, p. 449. Springer, Heidelberg (1999)CrossRefGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 2003

Authors and Affiliations

  • Nicolas Le Sommer
    • 1
  • Frédéric Guidec
    • 1
  1. 1.Valoria laboratoryUniversity of South BrittanyFrance

Personalised recommendations