Abstract
Using the unneeded computation power in the internet for distributed computing is getting more and more eligible. To increase the willingness to provide unneeded computing power, a secure platform is needed for the execution of untrusted code. We present the architecture of the JX operating system, which can be used to safely execute untrusted code. The problem of erroneous agents crashing the system is solved by using Java – a typesafe language – as implementation language. The resource consumption of the agents is controlled by a security manager, that inspects every interaction between an agent and a system service. If the security policy does not approve the use of a system service, the access can be denied. An agent execution system build upon JX is presented to illustrate the security problems occurring and the solutions provided by the operating system JX.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Anderson, M., Pose, R., Wallace, C.S.: A password-capability system. The Computer Journal 29, 1–8 (1986)
Back, G., Hsieh, W.C., Lepreau, J.: Processes in KaffeOS: Isolation, Resource Management, and Sharing in Java. In: Proc. of 4th Symposium on Operating Systems Design & Implementation (2000)
Boebert, W.E.: On the inability of an unmodified capability machine to enforce the *- property. In: Proc. of the 7th DoD/NBS Computer Security Conference, pp. 291–293 (1984)
Chase, J.S., Levy, H.M., Feeley, M.J., Lazowska, E.D.: Sharing and Protection in a Single Address Space Operating System. ACM Trans. on Computer Systems 12(4), 271–307 (1994)
Czajkowski, G., Daynes, L.: Multitasking without Compromise: A Virtual Machine Evolution. In: Proc. of the OOPSLA 2001, pp. 125–138 (2001)
Czajkowski, G., von Eicken, T.: JRes: A Resource Accounting Interface for Java. In: Proc. Of Conference on Object-Oriented Programming Systems, Languages, and Applications 1998, pp. 21–35. ACMPress, New York (1998)
Dean, D., Felten, E.W., Wallach, D.S., Balfanz, D., Denning, P.J.: Java security: Web browsers and beyond. In: Denning, D.E. (ed.) Internet Beseiged: Countering Cyberspace Scofflaws, pp. 241–269. ACM Press, New York (1998)
Dennis, J.B., Van Horn, E.C.: Programming Semantics for Multiprogrammed Computations. Communications of the ACM 9(3), 143–155 (1966)
Doorn, L.v.: A Secure Java Virtual Machine. In: Proc. of the 9th USENIX Security Symposium, pp. 19–34 (2000)
Fabry, R.S.: Capability-based addressing. Communications of the ACM 17(7), 403–412 (1974)
Ferraiolo, D., Kuhn, R.: Role-based access controls. In: Proc. of the 15th National Computer Security Conference, pp. 554–563 (1992)
Frantz, B.: KeyKOS – a secure, high-performance environment for S/370. In: Proc. Of SHARE 70, pp. 465–471 (1988)
Gefflaut, T., Jaeger, Y., Park, J., Liedtke, K., Elphinstone, V., Uhlig, J.E., Tidswell, L., Deller, L., Reuther, L.: The SawMill Multiserver Approach. In: Proc. of the 9th SIGOPS European Workshop (2000)
Hardy, N.: The confused deputy. Operating Systems Review 22(4), 36–38 (1988)
Hawblitzel, C., Chang, C.-C., Czajkowski, G., Hu, D., Eicken, T.v.: Implementing Multiple Protection Domains in Java. In: Proc. of the USENIX Annual Technical Conference, pp. 259–270 (1998)
Heiser, G., Elphinstone, K., Russel, S., Vochteloo, J.: Mungi: A Distributed Single Address- Space Operating System. In: 17th Australiasion Computer Science Conference, pp. 271–280 (1994)
Jaeger, T., Tidswell, J., Gefflaut, A., Park, Y., Liedtke, J., Elphinstone, K.: Synchronous IPC over Transparent Monitors. In: 9th SIGOPS European Workshop (2000)
Lampson, B.W.: A Note on the Confinement Problem. Communications of the ACM 16(10), 613–615 (1973)
Loscocco, P., Smalley, S.: Integrating Flexible Support for Security Policies into the Linux Operating System. In: Usenix 2001 Freenix Track (2001)
Mealy, G., Witt, B., Clark, W.: The Functional Structure of OS/360. IBM Systems Journal 5(1), 3–51 (1966)
Moon, D.A.: Symbolics Architecture. In: IEEE Computer, vol. 20(1), pp. 43–52. IEEE, Los Alamitos (1987)
Organick, E.I.: Computer System Organization. The B5700/B6700 Series. Academic Press, Inc., New York (1973)
Rushby, J.: Design and Verification of Secure Systems. In: Proc. of the 8th Symposium on Operating System Principles, pp. 12–21 (1981)
Shapiro, J.S., Smith, J.M., Farber, D.J.: EROS: a fast capability system. In: Symposium on Operating Systems Principles, pp. 170–185 (1999)
Shapiro, M.: Structure and Encapsulation in Distributed Systems: The Proxy Principle. In: ICDCS 1986, pp. 198–204 (1986)
Spencer, R., Smalley, S., Loscocco, P., Hibler, M., Anderson, D., Lepreau, J.: The Flask Security Architecture: System Support for Diverse Security Policies. In: Proc. of the 8th USENIX Security Symposium (1999)
Tanenbaum: Chapter 7. In: Distributed Operating Systems, Prentice Hall, Englewood Cliffs (1995)
Waldspurger, A., Weihl, W.E.: Stride Scheduling: Deterministic Proportional-Share Resource Mangement. Technical Report MIT/LCS/TM-528, Massachusetts Institute of Technology, MIT Laboratory for Computer Science (1995)
Webpage of VMWare, http://www.vmware.com
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wawersich, C., Felser, M., Golm, M., Kleinöder, J. (2003). The Security Architecture of the Java Operating System JX – A Security Architecture for Distributed Parallel Computing. In: Zhou, X., Xu, M., Jähnichen, S., Cao, J. (eds) Advanced Parallel Processing Technologies. APPT 2003. Lecture Notes in Computer Science, vol 2834. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39425-9_9
Download citation
DOI: https://doi.org/10.1007/978-3-540-39425-9_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20054-3
Online ISBN: 978-3-540-39425-9
eBook Packages: Springer Book Archive