首页 > 最新文献

Proceedings of the 8th ACM SIGOPS European workshop on Support for composing distributed applications最新文献

英文 中文
Protection wrappers: a simple and portable sandbox for untrusted applications 保护包装:一个简单和便携的沙箱,用于不受信任的应用程序
C. Jensen, D. Hagimont
In open and configurable applications, external programs are often used to handle different functions and data formats. This is particularly true for applications that communicate through the Internet, where new protocols and data formats are frequently introduced. These external programs are often installed quickly and without a full security auditing, even when the sources are available. This makes the users of such applications vulnerable to viruses and Trojan horses introduced by misconfiguration or flaws in the security of these applications. In this paper we introduce a mechanism called "protection wrappers" that allows an application to run external programs in a restricted environment called a "sandbox". Programs running in a sandbox will execute with the identity of a user with limited privileges. This reduces the potential damage to the system and to the data of the user who originally launched the application. 1 I n t r o d u c t i o n The dramatic growth of the Internet and the popularity of the World Wide Web have given birth to a new network community where individual users, academic and industrial institutions, in all countries, are exchanging data and software freely across the network. The Internet was previously used to exchange software and data among a small community of researchers who knew and trusted each other just like computer hobbyists have exchanged software on diskettes with friends, neighbors, and colleagues but today people connected to the Internet are receiving data and using software from various unknown sources, e.g. installing and using a new video player found on a Web server. In principle both programs and data should be carefully verified before being used, the program by the administrator who installs it and the data by the program *Universitfi Joseph Fourier, Grenoble tINRIA Rh6ne-Alpes that manipulates them. However, in many cases software or data are used without prior verification and without authentication of the source. Internet communication softwares like web browsers or mail readers are increasingly relying on external programs to display images or postscript files, play music or video dips, convert MIME encoded mail, or simply allow users to specify external pagers and editors. These programs are potential Trojan horses for two reasons: first because they may have been written by malicious programmers and secondly because they rarely implement a protection policy that allow them to verify data before operating on them. Most of these external programs are developed to be used in safe environments where data are generally trusted. Two good examples of this are Ghostscript (gs(1)) that allows users to preview their PostScript documents and MS-Word that can be used to prepare reports and write documentation for programs. However, PostScript is a full programming language, that for instance allows programs to access files in the file system, and MS-Word has the ability to create or update macros, based
在开放和可配置的应用程序中,通常使用外部程序来处理不同的功能和数据格式。对于通过Internet进行通信的应用程序尤其如此,因为经常会引入新的协议和数据格式。这些外部程序通常安装得很快,而且没有进行完整的安全审计,即使在源代码可用时也是如此。这使得这些应用程序的用户容易受到由于这些应用程序的错误配置或安全性缺陷而引入的病毒和特洛伊木马的攻击。在本文中,我们介绍了一种称为“保护包装器”的机制,它允许应用程序在称为“沙箱”的受限环境中运行外部程序。在沙箱中运行的程序将以具有有限特权的用户身份执行。这减少了对系统和最初启动应用程序的用户的数据的潜在损害。互联网的迅速发展和万维网的普及催生了一个新的网络社区,在这个社区里,各国的个人用户、学术机构和工业机构都在通过网络自由地交换数据和软件。互联网以前是用来在一个相互了解和信任的研究人员的小社区之间交换软件和数据的,就像计算机爱好者与朋友、邻居和同事交换软盘上的软件一样,但今天,连接到互联网的人们正在接收来自各种未知来源的数据和使用软件,例如安装和使用在Web服务器上找到的新视频播放器。原则上,程序和数据在使用前都应该仔细验证,程序由安装它的管理员验证,数据由程序*Universitfi Joseph Fourier, Grenoble tINRIA Rh6ne-Alpes操作它们。然而,在许多情况下,软件或数据的使用没有事先验证,也没有对来源进行认证。像网络浏览器或邮件阅读器这样的互联网通信软件越来越依赖于外部程序来显示图像或后记文件,播放音乐或视频片段,转换MIME编码的邮件,或者只是允许用户指定外部寻呼机和编辑器。这些程序是潜在的特洛伊木马,有两个原因:首先是因为它们可能是由恶意程序员编写的,其次是因为它们很少实现允许它们在操作之前验证数据的保护策略。大多数这些外部程序都是为了在数据通常可信的安全环境中使用而开发的。两个很好的例子是Ghostscript (gs(1)),它允许用户预览他们的PostScript文档,MS-Word可以用来准备报告和编写程序文档。然而,PostScript是一种完整的编程语言,例如,它允许程序访问文件系统中的文件,MS-Word具有基于文档中找到的定义创建或更新宏的能力。当这些程序在因特网的潜在恶意环境中使用时,从web服务器检索到的PostScript文档或附加到电子邮件中的Word文档可能是由攻击者精心准备的,这些程序可以像特洛伊木马一样破坏用户文件或帮助潜在的入侵者破坏站点安全。因此,提供保护服务以防止使用这些程序损坏机器和运行程序的用户的环境是至关重要的。在本文中,我们提出了一种可移植机制,该机制将程序隔离在具有受限权限的沙盒中。这种机制的工作原理是将应用程序包装在实现“需要知道”原则的前端程序(包装器)中,而不修改应用程序本身。隔离在沙箱中的程序最初可能没有明确定义的访问权限。其他的权利是
{"title":"Protection wrappers: a simple and portable sandbox for untrusted applications","authors":"C. Jensen, D. Hagimont","doi":"10.1145/319195.319211","DOIUrl":"https://doi.org/10.1145/319195.319211","url":null,"abstract":"In open and configurable applications, external programs are often used to handle different functions and data formats. This is particularly true for applications that communicate through the Internet, where new protocols and data formats are frequently introduced. These external programs are often installed quickly and without a full security auditing, even when the sources are available. This makes the users of such applications vulnerable to viruses and Trojan horses introduced by misconfiguration or flaws in the security of these applications. In this paper we introduce a mechanism called \"protection wrappers\" that allows an application to run external programs in a restricted environment called a \"sandbox\". Programs running in a sandbox will execute with the identity of a user with limited privileges. This reduces the potential damage to the system and to the data of the user who originally launched the application. 1 I n t r o d u c t i o n The dramatic growth of the Internet and the popularity of the World Wide Web have given birth to a new network community where individual users, academic and industrial institutions, in all countries, are exchanging data and software freely across the network. The Internet was previously used to exchange software and data among a small community of researchers who knew and trusted each other just like computer hobbyists have exchanged software on diskettes with friends, neighbors, and colleagues but today people connected to the Internet are receiving data and using software from various unknown sources, e.g. installing and using a new video player found on a Web server. In principle both programs and data should be carefully verified before being used, the program by the administrator who installs it and the data by the program *Universitfi Joseph Fourier, Grenoble tINRIA Rh6ne-Alpes that manipulates them. However, in many cases software or data are used without prior verification and without authentication of the source. Internet communication softwares like web browsers or mail readers are increasingly relying on external programs to display images or postscript files, play music or video dips, convert MIME encoded mail, or simply allow users to specify external pagers and editors. These programs are potential Trojan horses for two reasons: first because they may have been written by malicious programmers and secondly because they rarely implement a protection policy that allow them to verify data before operating on them. Most of these external programs are developed to be used in safe environments where data are generally trusted. Two good examples of this are Ghostscript (gs(1)) that allows users to preview their PostScript documents and MS-Word that can be used to prepare reports and write documentation for programs. However, PostScript is a full programming language, that for instance allows programs to access files in the file system, and MS-Word has the ability to create or update macros, based","PeriodicalId":335784,"journal":{"name":"Proceedings of the 8th ACM SIGOPS European workshop on Support for composing distributed applications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130186510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Porcupine scalable mail server Porcupine可扩展邮件服务器
Yasushi Saito, Eric Hoffman, B. Bershad, H. Levy, D. Becker, B. Folliot
This paper describes the design and preliminary performance of the Porcupine mail server, a clusterbased mail server that can handle up to I billion messages a day. Unlike common large-scale mail servers deployed today, there is no role separation among nodes. Each node in the cluster runs all the services supported by the cluster and balances the workload dynamically using the cluster membership information. This architecture is more available, manageable, and scalable than traditional architecture.
本文描述了Porcupine邮件服务器的设计和初步性能,这是一个基于集群的邮件服务器,每天可以处理多达10亿条消息。与目前部署的常见大规模邮件服务器不同,节点之间没有角色分离。集群中的每个节点运行集群支持的所有服务,并使用集群成员信息动态平衡工作负载。这种体系结构比传统体系结构更可用、更易于管理和可扩展。
{"title":"The Porcupine scalable mail server","authors":"Yasushi Saito, Eric Hoffman, B. Bershad, H. Levy, D. Becker, B. Folliot","doi":"10.1145/319195.319203","DOIUrl":"https://doi.org/10.1145/319195.319203","url":null,"abstract":"This paper describes the design and preliminary performance of the Porcupine mail server, a clusterbased mail server that can handle up to I billion messages a day. Unlike common large-scale mail servers deployed today, there is no role separation among nodes. Each node in the cluster runs all the services supported by the cluster and balances the workload dynamically using the cluster membership information. This architecture is more available, manageable, and scalable than traditional architecture.","PeriodicalId":335784,"journal":{"name":"Proceedings of the 8th ACM SIGOPS European workshop on Support for composing distributed applications","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114563332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Efficient mobile access to the WWW over GSM 通过GSM高效移动接入WWW
X. Delord, S. Perret, A. Duda
An increasing number of users access the W W W from small portable mobile hosts connected through different network interfaces supporting mobility: wireless low bandwidth connections over long distances (GSM 9.6 Kbi t /s ) , wireless medium bandwidth connections over small distances (waveLAN 2 Mbit /s) , desk area infrared connections to stationary LANs (NetBeamIR 4 Mbit/s) . The connections have different distance coverage, bandwidth, latency, cost, and quality of service (error rate, j i t ter) and the parameters may vary over time. GSM provides global untethered connectivity thus allowing ubiquitous mobile access to the WWW: anywhere, anytime. However, it suffers from relatively slow bandwidth and important cost compared to its wired counterpart. Various client devices can use GSM ranging from PDAs to full-featured laptops. In order to use GSM efficiently, we need system and application support for reducing bandwidth requirements, adapting to hardware variations, and optimizing connection costs. In this paper, we propose an application support for W W W access based on a different paradigm than the previous work: we use mobile agents to delegate all t ime-consuming operations to the network, in particular, downloading documents and data type specific distillation of their contents.
越来越多的用户通过支持移动性的不同网络接口连接的小型便携式移动主机访问www:远距离无线低带宽连接(GSM 9.6 Kbi t/s),短距离无线中等带宽连接(wavan 2 Mbit/s),办公桌区域红外连接到固定局域网(NetBeamIR 4 Mbit/s)。这些连接具有不同的距离覆盖范围、带宽、延迟、成本和服务质量(错误率),并且这些参数可能随时间而变化。GSM提供全球不受限制的连接,从而允许无处不在的移动访问WWW:任何地方,任何时间。然而,与有线通信相比,它的带宽相对较慢,成本也很高。从pda到功能齐全的笔记本电脑,各种客户端设备都可以使用GSM。为了有效地使用GSM,我们需要系统和应用支持来降低带宽需求、适应硬件变化和优化连接成本。在本文中,我们提出了一种基于不同于以往工作范式的应用程序对www访问的支持:我们使用移动代理将所有耗时的操作委托给网络,特别是下载文档和对其内容进行特定数据类型的提炼。
{"title":"Efficient mobile access to the WWW over GSM","authors":"X. Delord, S. Perret, A. Duda","doi":"10.1145/319195.319196","DOIUrl":"https://doi.org/10.1145/319195.319196","url":null,"abstract":"An increasing number of users access the W W W from small portable mobile hosts connected through different network interfaces supporting mobility: wireless low bandwidth connections over long distances (GSM 9.6 Kbi t /s ) , wireless medium bandwidth connections over small distances (waveLAN 2 Mbit /s) , desk area infrared connections to stationary LANs (NetBeamIR 4 Mbit/s) . The connections have different distance coverage, bandwidth, latency, cost, and quality of service (error rate, j i t ter) and the parameters may vary over time. GSM provides global untethered connectivity thus allowing ubiquitous mobile access to the WWW: anywhere, anytime. However, it suffers from relatively slow bandwidth and important cost compared to its wired counterpart. Various client devices can use GSM ranging from PDAs to full-featured laptops. In order to use GSM efficiently, we need system and application support for reducing bandwidth requirements, adapting to hardware variations, and optimizing connection costs. In this paper, we propose an application support for W W W access based on a different paradigm than the previous work: we use mobile agents to delegate all t ime-consuming operations to the network, in particular, downloading documents and data type specific distillation of their contents.","PeriodicalId":335784,"journal":{"name":"Proceedings of the 8th ACM SIGOPS European workshop on Support for composing distributed applications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126958628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Driving the composition of runtime platforms by architectural knowledge 通过架构知识驱动运行时平台的组合
L. Baum, Martin Becker, L. Geyer, G. Molter, P. Sturm
Reusing app roved components is an a ttractive approach for the c ustomization o f runtime platforms in an economically sensible manner. However, the successful t ransition from particular requirements to a suitable architecture including appropriate components heavily relies on the expertise of t he system designers. In this paper, we propose an a rchitecture-driven approach to support runtime platform developers in the c omposition o f customized p latforms. Central to this approach is the explicit consideration of architectural aspects on an intermediate level of description. At this level, the appropriate matching o f requirements against properties of available components is controlled by formalized architectural knowledge. With SDL patterns and design spaces we present t wo techniques for performing this mapping process.
重用经过应用程序验证的组件是一种有吸引力的方法,可以以经济上合理的方式定制运行时平台。然而,从特定需求到包含适当组件的合适架构的成功转换在很大程度上依赖于系统设计人员的专业知识。在本文中,我们提出了一种架构驱动的方法来支持运行时平台开发人员组合自定义平台。这种方法的核心是在描述的中间层次上明确地考虑体系结构方面。在这个级别上,需求与可用组件属性的适当匹配是由形式化的体系结构知识控制的。对于SDL模式和设计空间,我们提供了两种执行此映射过程的技术。
{"title":"Driving the composition of runtime platforms by architectural knowledge","authors":"L. Baum, Martin Becker, L. Geyer, G. Molter, P. Sturm","doi":"10.1145/319195.319217","DOIUrl":"https://doi.org/10.1145/319195.319217","url":null,"abstract":"Reusing app roved components is an a ttractive approach for the c ustomization o f runtime platforms in an economically sensible manner. However, the successful t ransition from particular requirements to a suitable architecture including appropriate components heavily relies on the expertise of t he system designers. In this paper, we propose an a rchitecture-driven approach to support runtime platform developers in the c omposition o f customized p latforms. Central to this approach is the explicit consideration of architectural aspects on an intermediate level of description. At this level, the appropriate matching o f requirements against properties of available components is controlled by formalized architectural knowledge. With SDL patterns and design spaces we present t wo techniques for performing this mapping process.","PeriodicalId":335784,"journal":{"name":"Proceedings of the 8th ACM SIGOPS European workshop on Support for composing distributed applications","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120948552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A customizable library to support software synthesis for embedded applications and micro-kernel systems 一个可定制的库,支持嵌入式应用程序和微内核系统的软件合成
C. Ditze
Experiences gained from the design of micro-kernel related to either high-performance or hard real-time computing have shown that customization plays a major role to enhance the performance of applications while maintaining a reusable and flexible software architecture. Our goal is to cover both fields by developing a customizable library operating system (DREAMS 1) intended to be used as a basis for the synthesis of application-specific run-time platforms or operating system kernel.
从与高性能或硬实时计算相关的微内核设计中获得的经验表明,定制在增强应用程序性能的同时保持可重用和灵活的软件体系结构方面起着重要作用。我们的目标是通过开发一个可定制的库操作系统(DREAMS 1)来覆盖这两个领域,这个库操作系统被用作合成特定于应用程序的运行时平台或操作系统内核的基础。
{"title":"A customizable library to support software synthesis for embedded applications and micro-kernel systems","authors":"C. Ditze","doi":"10.1145/319195.319209","DOIUrl":"https://doi.org/10.1145/319195.319209","url":null,"abstract":"Experiences gained from the design of micro-kernel related to either high-performance or hard real-time computing have shown that customization plays a major role to enhance the performance of applications while maintaining a reusable and flexible software architecture. Our goal is to cover both fields by developing a customizable library operating system (DREAMS 1) intended to be used as a basis for the synthesis of application-specific run-time platforms or operating system kernel.","PeriodicalId":335784,"journal":{"name":"Proceedings of the 8th ACM SIGOPS European workshop on Support for composing distributed applications","volume":"8 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132340681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Battery-powered distributed systems (extended abstract) 电池供电的分布式系统(扩展摘要)
P. Havinga, A. Helme, S. Mullender, G. Smit, J. Smit
Mobile personal computers will be a vital technology for making electronic information processing available to people on the move. We expect personal mobile computers, 'mobile digital companions', to be small enough that they can be carried along all day, versatile enough that they can be used for all kinds of information processing -- diary, notebook, pager, telephone, walk man, dictation, e-mail, e-money, keys, ID -- and frugal enough that they can be used all day without recharging. This paper reports ongoing work on Moby Dick, a research project that addresses fundamental issues in the architecture, design and implementation of lowpower hand-held computers, with particular emphases on energy conservation and security. The goal is to investigate architectural issues in hardware and software design in concert, so that opportunities in hardware design can be exploited by supportive software.
移动个人计算机将成为使移动中的人们能够处理电子信息的一项重要技术。我们期望个人移动电脑,“移动数字伴侣”,足够小,可以整天随身携带,足够多用途,可以用于各种信息处理——日记、笔记本、寻呼机、电话、随身听、听写、电子邮件、电子货币、钥匙、身份证——足够节省,可以整天使用而不充电。这篇论文报告了Moby Dick正在进行的工作,这是一个研究项目,旨在解决低功耗手持计算机的架构、设计和实现中的基本问题,特别强调节能和安全。目标是研究硬件和软件设计中的体系结构问题,以便支持性软件可以利用硬件设计中的机会。
{"title":"Battery-powered distributed systems (extended abstract)","authors":"P. Havinga, A. Helme, S. Mullender, G. Smit, J. Smit","doi":"10.1145/319195.319227","DOIUrl":"https://doi.org/10.1145/319195.319227","url":null,"abstract":"Mobile personal computers will be a vital technology for making electronic information processing available to people on the move. We expect personal mobile computers, 'mobile digital companions', to be small enough that they can be carried along all day, versatile enough that they can be used for all kinds of information processing -- diary, notebook, pager, telephone, walk man, dictation, e-mail, e-money, keys, ID -- and frugal enough that they can be used all day without recharging. This paper reports ongoing work on Moby Dick, a research project that addresses fundamental issues in the architecture, design and implementation of lowpower hand-held computers, with particular emphases on energy conservation and security. The goal is to investigate architectural issues in hardware and software design in concert, so that opportunities in hardware design can be exploited by supportive software.","PeriodicalId":335784,"journal":{"name":"Proceedings of the 8th ACM SIGOPS European workshop on Support for composing distributed applications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125338287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Escaping the evils of centralized control with self-certifying pathnames 通过自认证路径名避免集中控制的弊端
David Mazires, Frans Kaashoek
People have long trusted central authorities to coordinate secure collaboration on local-area networks. Unfortunately, the Internet doesn’t provide the kind of administrative structures individual organizations do. As such, users risk painful consequen ces if global, distributed systems rely on central authorities for security. Fortunately, securit y need not come at the price of centralized control. To prove it, we present SFS, a secure, global, decen tralized file system permitting easy cross-administrative realm collaboration. With a simple i d a, self-certifying pathnames, SFS lets users escape the evils of centralized control.
长期以来,人们一直信任中央机构在局域网上协调安全协作。不幸的是,Internet不提供个人组织所提供的那种管理结构。因此,如果全球分布式系统依赖中央权威机构来保证安全性,用户将面临痛苦的后果。幸运的是,安全并不需要以集中控制为代价。为了证明这一点,我们提出了SFS,这是一个安全的、全局的、分散的文件系统,允许轻松的跨管理领域协作。通过一个简单的自认证路径名,SFS让用户避免了集中控制的弊端。
{"title":"Escaping the evils of centralized control with self-certifying pathnames","authors":"David Mazires, Frans Kaashoek","doi":"10.1145/319195.319213","DOIUrl":"https://doi.org/10.1145/319195.319213","url":null,"abstract":"People have long trusted central authorities to coordinate secure collaboration on local-area networks. Unfortunately, the Internet doesn’t provide the kind of administrative structures individual organizations do. As such, users risk painful consequen ces if global, distributed systems rely on central authorities for security. Fortunately, securit y need not come at the price of centralized control. To prove it, we present SFS, a secure, global, decen tralized file system permitting easy cross-administrative realm collaboration. With a simple i d a, self-certifying pathnames, SFS lets users escape the evils of centralized control.","PeriodicalId":335784,"journal":{"name":"Proceedings of the 8th ACM SIGOPS European workshop on Support for composing distributed applications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117236672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Dual objects—an object model for distributed system programming 双对象——分布式系统编程的对象模型
J. Nolte, Wolfgang Schröder-Preikschat
When parallel processing became popular at the end of the eighties, it became evident that common operating systems were not able to deliver the pure performance of parallel hardware to parallel applications. Much processing power was wasted with complex system call mechanisms and sometimes vast resource consumptions of the operating system itself. Even micro-kernel based systems were often too slow, because these also relied on computing power consuming concepts like address space separation or virtual memory systems. Nevertheless, some applications required exactly those functionalities that others denied for performance reasons. Since this contradiction can hardly be solved within a single operating system, the PEACE operating system family[10] was developed at GMD-FIRST. The most simple family members were represented as highly efficient runtime libraries while the most complex members can be regarded as full fledged micro-kernel based operating systems. Family based systems can be implemented conveniently by means of object oriented programming paradigms. Thus the PEACE operating system family has entirely been implemented in C++. Operating system services are implemented as classes and users can extend and specialize these system classes by means of inheritance mechanisms. In theory this scenario is sound and straight forward but in practice the conceptual advantages of object orientation are extremely hard to exploit without suitable object models and language-level support for object-oriented implementation techniques in distributed contexts. When users extend and specialize PEACE classes by means of inheritance mechanisms, class hierarchies need to be extended across address spaces as well as network boundaries and objects can be fragmented across address spaces. This in turn can lead to serious performance bugs caused by frequent remote invocations, when application classes closely interact with their system-level base classes. On the other hand it is obvious that client classes cannot have full access to system-level state information to avoid forgery and ease resource sharing amongst many clients. Implementing system services as fragmented objects[7] like in the SOS system [12] would have supported independence as well as encapsulation of object fragments allocated in different address spaces. Nevertheless we considered that model already too complex for those very lightweight system structures we were aiming at, because
当并行处理在80年代末开始流行时,很明显,普通操作系统无法为并行应用程序提供并行硬件的纯性能。复杂的系统调用机制浪费了大量的处理能力,有时还会消耗操作系统本身的大量资源。即使是基于微内核的系统也常常太慢,因为它们还依赖于计算能力消耗的概念,如地址空间分离或虚拟内存系统。然而,有些应用程序需要的正是其他应用程序出于性能原因拒绝的那些功能。由于这种矛盾很难在单一操作系统内解决,因此在GMD-FIRST上开发了PEACE操作系统家族[10]。最简单的家族成员被表示为高效的运行时库,而最复杂的家族成员可以被视为完全成熟的基于微内核的操作系统。基于家族的系统可以通过面向对象的编程范式方便地实现。因此,PEACE操作系统家族完全是用c++实现的。操作系统服务被实现为类,用户可以通过继承机制扩展和专门化这些系统类。理论上,这种情况是合理且直接的,但在实践中,如果没有合适的对象模型和对分布式环境中面向对象实现技术的语言级支持,面向对象的概念优势就很难利用。当用户通过继承机制扩展和专门化PEACE类时,需要跨地址空间和网络边界扩展类层次结构,并且对象可以跨地址空间碎片化。当应用程序类与其系统级基类密切交互时,这会导致频繁的远程调用导致严重的性能错误。另一方面,很明显,客户端类不能完全访问系统级状态信息,以避免伪造和简化许多客户端之间的资源共享。将系统服务实现为碎片对象[7],就像在SOS系统[12]中那样,将支持在不同地址空间中分配的对象片段的独立性和封装性。然而我们认为这个模型对于我们所瞄准的轻量级系统结构来说已经太复杂了,因为
{"title":"Dual objects—an object model for distributed system programming","authors":"J. Nolte, Wolfgang Schröder-Preikschat","doi":"10.1145/319195.319235","DOIUrl":"https://doi.org/10.1145/319195.319235","url":null,"abstract":"When parallel processing became popular at the end of the eighties, it became evident that common operating systems were not able to deliver the pure performance of parallel hardware to parallel applications. Much processing power was wasted with complex system call mechanisms and sometimes vast resource consumptions of the operating system itself. Even micro-kernel based systems were often too slow, because these also relied on computing power consuming concepts like address space separation or virtual memory systems. Nevertheless, some applications required exactly those functionalities that others denied for performance reasons. Since this contradiction can hardly be solved within a single operating system, the PEACE operating system family[10] was developed at GMD-FIRST. The most simple family members were represented as highly efficient runtime libraries while the most complex members can be regarded as full fledged micro-kernel based operating systems. Family based systems can be implemented conveniently by means of object oriented programming paradigms. Thus the PEACE operating system family has entirely been implemented in C++. Operating system services are implemented as classes and users can extend and specialize these system classes by means of inheritance mechanisms. In theory this scenario is sound and straight forward but in practice the conceptual advantages of object orientation are extremely hard to exploit without suitable object models and language-level support for object-oriented implementation techniques in distributed contexts. When users extend and specialize PEACE classes by means of inheritance mechanisms, class hierarchies need to be extended across address spaces as well as network boundaries and objects can be fragmented across address spaces. This in turn can lead to serious performance bugs caused by frequent remote invocations, when application classes closely interact with their system-level base classes. On the other hand it is obvious that client classes cannot have full access to system-level state information to avoid forgery and ease resource sharing amongst many clients. Implementing system services as fragmented objects[7] like in the SOS system [12] would have supported independence as well as encapsulation of object fragments allocated in different address spaces. Nevertheless we considered that model already too complex for those very lightweight system structures we were aiming at, because","PeriodicalId":335784,"journal":{"name":"Proceedings of the 8th ACM SIGOPS European workshop on Support for composing distributed applications","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116064103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Resource management for extensible Internet servers 可扩展Internet服务器的资源管理
G. Czajkowski, Chi-Chao Chang, C. Hawblitzel, Deyu Hu, T. V. Eicken
With the continued spread of the Internet the typical computing model for servers is undergoing a drastic change. In the past, server systems have moved from providing interactive time-sharing service to providing fileserver and now more general back-office (mail, database, web, etc.) services. While the characteristics of the new Internet server systems are not yet clear, we expect that Internet servers will have at least three characteristics that distinguish them drastically from today’s servers: (i) high code mobility, (ii) large numbers of anonymous users, and (iii) significant concern for the efficient use of resources.
随着互联网的不断普及,典型的服务器计算模式正在发生巨大的变化。在过去,服务器系统已经从提供交互式分时服务转变为提供文件服务器和现在更通用的后台(邮件、数据库、web等)服务。虽然新的互联网服务器系统的特征尚不清楚,但我们预计互联网服务器将至少具有三个特征,使它们与今天的服务器截然不同:(i)高代码移动性,(ii)大量匿名用户,以及(iii)对资源有效利用的重要关注。
{"title":"Resource management for extensible Internet servers","authors":"G. Czajkowski, Chi-Chao Chang, C. Hawblitzel, Deyu Hu, T. V. Eicken","doi":"10.1145/319195.319201","DOIUrl":"https://doi.org/10.1145/319195.319201","url":null,"abstract":"With the continued spread of the Internet the typical computing model for servers is undergoing a drastic change. In the past, server systems have moved from providing interactive time-sharing service to providing fileserver and now more general back-office (mail, database, web, etc.) services. While the characteristics of the new Internet server systems are not yet clear, we expect that Internet servers will have at least three characteristics that distinguish them drastically from today’s servers: (i) high code mobility, (ii) large numbers of anonymous users, and (iii) significant concern for the efficient use of resources.","PeriodicalId":335784,"journal":{"name":"Proceedings of the 8th ACM SIGOPS European workshop on Support for composing distributed applications","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125316721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Nested Java processes: OS structure for mobile code 嵌套Java进程:移动代码的操作系统结构
Patrick Tullmann, Jay Lepreau
The majority of work on protection in single-language mobile code environments focuses on information security issues and depends on the language environment for solutions to the problems of resource management and process isolation. We believe that what is needed in these environments are not ad-hoc or incremental changes but a coherent approach to security, failure isolation, and resource management. Protection, separation, and control of the resources used by mutually untrusting components, applets, applications, or agents are exactly the same problems faced by multi-user operating systems. We believe that real solutions will come only if an OS model is uniformly applied to these environments. We present Alta, our prototype Java-based system patterned on Fluke, a highly structured, hardware-based OS, and report on its features appropriate to mobile code. 1 Operating System Model Required In the last European SIGOPS Workshop, our paper [17] argued that the local operating system is an essential foundation for global applications. We described the many demands that a reasonably well functioning distributed system places on the local OS, and particularly emphasized end-system security in the widespread presence of mobile code. The focus of that paper was on making the case for the importance of the local OS, and outlining an appropriate OS for that environment: the Fluke [10] operating system, an OS based on a recursive virtual machine model, analogous to the Cambridge CAP Computer [30], but implemented by a microkernel instead of special hardware. In this paper we assume that the importance of the local This research was supported in part by the Defense Advanced Research Projects Agency, monitored by the Department of the Army under contract number DABT63–94–C–0058, and the Air Force Research Laboratory, Rome Research Site, USAF, under agreement number F30602–96–2–0269. The U.S. Government is authorized to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright annotation hereon. OS to distributed applications is evident. From that base, we endeavor to make four points concerning platforms for mixed trust components and mobile code: (i) A coherent, structured approach is required, driven by a full-blown OS model; language-level patches are not enough. (ii) Existing security-oriented approaches fall short in resource management. (iii) Applying an OS model is feasible, based upon our initial experiences with Alta. (iv) Alta provides features useful for mobile code, including hierarchical resource management and flexible object sharing. 1.1 Application Scenario In 1997 MCI developed and distributed its Denial of Service Tracker (DoSTracker) [19], after getting their router vendor to add the required interfaces and code to the routers. DoSTracker works as follows. Many denial of service attacks involve generating packets that spoof the IP address of the victim’s host. For example, fabricating broadcast packets will
在单语言移动代码环境中进行保护的大部分工作侧重于信息安全问题,并依赖于语言环境来解决资源管理和进程隔离问题。我们认为,在这些环境中需要的不是临时的或增量的更改,而是安全、故障隔离和资源管理的一致方法。相互不信任的组件、小程序、应用程序或代理所使用的资源的保护、分离和控制与多用户操作系统所面临的问题完全相同。我们相信,只有将操作系统模型统一应用于这些环境,才会出现真正的解决方案。我们展示了Alta,这是基于Fluke(一个高度结构化、基于硬件的操作系统)的基于java的原型系统,并报告了它适合移动代码的特性。在上一届欧洲SIGOPS研讨会上,我们的论文[17]认为本地操作系统是全球应用的必要基础。我们描述了一个运行良好的分布式系统对本地操作系统的许多要求,并特别强调了移动代码广泛存在的终端系统安全性。那篇论文的重点是说明本地操作系统的重要性,并概述了适合该环境的操作系统:Fluke[10]操作系统,基于递归虚拟机模型的操作系统,类似于剑桥CAP计算机[30],但由微内核而不是特殊硬件实现。该研究得到了美国国防部高级研究计划局的部分支持,由美国陆军监督,合同编号为DABT63-94-C-0058,美国空军罗马研究基地空军研究实验室,协议编号为F30602-96-2-0269。美国政府有权为政府目的复制和分发重印本,尽管此处有任何版权注释。操作系统对分布式应用程序的影响是显而易见的。在此基础上,我们努力提出关于混合信任组件和移动代码平台的四点:(i)需要一种连贯的、结构化的方法,由成熟的操作系统模型驱动;语言级别的补丁是不够的。现有面向安全的办法在资源管理方面不足。(iii)根据我们对Alta的初步经验,应用OS模型是可行的。(iv) Alta提供了对移动代码有用的功能,包括分层资源管理和灵活的对象共享。1.1应用场景1997年,MCI在获得路由器供应商的支持后,开发并发布了拒绝服务跟踪器(DoSTracker)[19]。DoSTracker的工作原理如下。许多拒绝服务攻击涉及生成欺骗受害者主机IP地址的数据包。例如,制作广播数据包将生成对“发送者”的大量回复。当客户报告对特定主机的攻击时,他们的ISP会在连接到受害者路由器的机器上运行DoSTracker,并将受害者的IP地址提供给它。DoSTracker从一个路由器跳到另一个路由器,跟随被欺骗的广播数据包“上游”到实际的源。当这条路径通向另一家互联网运营商的主机——一个不同的管理和技术领域——其路由器很可能不支持所需的接口时,问题就出现了。类似的难以预测的问题在网络管理中不断出现,解决方案很难快速部署,而且几乎不可能标准化。为网络管理员提供这些问题的解决方案的第一步可能是让他们在路由器上运行移动程序。当然,这是主动网络的一个例子[28]。人们不需要对活动网络(任何数据包中的代码)抱有激进的看法,就能理解在路由器中支持移动代码的价值。网络管理是一个应用领域,可以从移动代码和移动组件的动态组合中获得巨大收益。然而,除了移动代码提供的解决方案外,还必须有强大的安全性保证和灵活的分层资源管理。考虑以下现实的internet范围的分层信任和比例共享资源管理场景。MCI在每个路由器中保留80%的资源用于“实际工作”(即转发数据包)。剩下的20%则可根据需要用于管理功能(如DoSTracker)、移动代码或座席。其中的50%(即总额的10%)留给MCI自己的管理程序,其余的提供给其客户。然而,并非所有客户都是平等的,因此MCI将这10%的50%分配给20多个长途互联网运营商,如Digex1或AT&T,另外50%分配给其他客户(如isp)。
{"title":"Nested Java processes: OS structure for mobile code","authors":"Patrick Tullmann, Jay Lepreau","doi":"10.1145/319195.319212","DOIUrl":"https://doi.org/10.1145/319195.319212","url":null,"abstract":"The majority of work on protection in single-language mobile code environments focuses on information security issues and depends on the language environment for solutions to the problems of resource management and process isolation. We believe that what is needed in these environments are not ad-hoc or incremental changes but a coherent approach to security, failure isolation, and resource management. Protection, separation, and control of the resources used by mutually untrusting components, applets, applications, or agents are exactly the same problems faced by multi-user operating systems. We believe that real solutions will come only if an OS model is uniformly applied to these environments. We present Alta, our prototype Java-based system patterned on Fluke, a highly structured, hardware-based OS, and report on its features appropriate to mobile code. 1 Operating System Model Required In the last European SIGOPS Workshop, our paper [17] argued that the local operating system is an essential foundation for global applications. We described the many demands that a reasonably well functioning distributed system places on the local OS, and particularly emphasized end-system security in the widespread presence of mobile code. The focus of that paper was on making the case for the importance of the local OS, and outlining an appropriate OS for that environment: the Fluke [10] operating system, an OS based on a recursive virtual machine model, analogous to the Cambridge CAP Computer [30], but implemented by a microkernel instead of special hardware. In this paper we assume that the importance of the local This research was supported in part by the Defense Advanced Research Projects Agency, monitored by the Department of the Army under contract number DABT63–94–C–0058, and the Air Force Research Laboratory, Rome Research Site, USAF, under agreement number F30602–96–2–0269. The U.S. Government is authorized to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright annotation hereon. OS to distributed applications is evident. From that base, we endeavor to make four points concerning platforms for mixed trust components and mobile code: (i) A coherent, structured approach is required, driven by a full-blown OS model; language-level patches are not enough. (ii) Existing security-oriented approaches fall short in resource management. (iii) Applying an OS model is feasible, based upon our initial experiences with Alta. (iv) Alta provides features useful for mobile code, including hierarchical resource management and flexible object sharing. 1.1 Application Scenario In 1997 MCI developed and distributed its Denial of Service Tracker (DoSTracker) [19], after getting their router vendor to add the required interfaces and code to the routers. DoSTracker works as follows. Many denial of service attacks involve generating packets that spoof the IP address of the victim’s host. For example, fabricating broadcast packets will ","PeriodicalId":335784,"journal":{"name":"Proceedings of the 8th ACM SIGOPS European workshop on Support for composing distributed applications","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127028132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
期刊
Proceedings of the 8th ACM SIGOPS European workshop on Support for composing distributed applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1