SHAP — Secure Hardware Agent Platform
نویسندگان
چکیده
This paper presents a novel implementation of an embedded Java microarchitecture for secure, realtime, and multi-threaded applications. Together with the support of modern features of object-oriented languages, such as exception handling, automatic garbage collection and interface types, a general-purpose platform is established which also fits for the agent concept. Especially, considering real-time issues, new techniques have been implemented in our Java microarchitecture, such as an integrated stack and thread management for fast context switching, concurrent garbage collection for real-time threads and autonomous control flows through preemptive round-robin scheduling.
منابع مشابه
Secure Authentication Using Certificate Revocation List (Crl) and Message Signature in Vanet
A vehicular ad hoc network (VANETs) provides the security through the Public Key Infrastructure (PKI) and Certificate Revocation Lists (CRLs). In any PKI system, the signature of sender and certificate should be verified in CRL list. Also verifying the certificate of the sender then authentication is provided to received message. In this paper, secure hash authentication protocol (SHAP) verifie...
متن کاملSMASH: Modular Security for Mobile Agents TR-UTEDGE-2006-007
Mobile agent systems of the future will be used for secure information delivery and retrieval, off-line searching and purchasing, and even system software updates. As part of such applications, agent and platform integrity must be maintained, confidentiality between agents and the intended platform parties must be preserved, and accountability of agents and their platform counterparts must be s...
متن کاملAn Overview of SECMAP Secure Mobile Agent Platform
Mobile agent technology presents an attractive alternative to the client-server paradigm; however, the lack of a feasible agent security model seriously hinders the adoption of the agent paradigm. This paper describes a mobile agent platform, Secure Mobile Agent Platform (SECMAP) and its security infrastructure. SECMAP presents abstractions which ensure the protection of agents and system compo...
متن کاملA Secure Communication Framework for Mobile Agents
Communication, a fundamental concept in computing, allows two pieces of software to interact and to exchange information. It is an important aspect of mobile agent systems because mobile agents generally need to coordinate their activities through some type of communication. Using mobile agent technologies provides potential benefits to distributed applications; however, an agent’s ability to m...
متن کاملAnalysis of the Intel Pentium's Ability to Support a Secure Virtual Machine Monitor
A virtual machine monitor (VMM) allows multiple operating systems to run concurrently on virtual machines (VMs) on a single hardware platform. Each VM can be treated as an independent operating system platform. A secure VMM would enforce an overarching security policy on its VMs. The potential benefits of a secure VMM for PCs include: a more secure environment, familiar COTS operating systems a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007