Abstract
Software deployment can turn into a baffling problem when the components being deployed exhibit non-functional requirements. If the platform on which such components are deployed cannot satisfy their non-functional requirements, then they may in turn fail to perform satisfactorily. In this paper we propose a contract-based approach of resourceconstrained software deployment. We thus focus on a specific category of non-functional requirements: those that pertain to the resources software components need to use at runtime. Ultimately, our objective is to provide software components with means to specify their requirements regarding hardware and/or software resources, and to design methods and models for utilising this kind of information at any stage of a component’s life-cycle. The paper reports the design of Jamus, an experimental platform we develop in order to support the deployment of mobile software components, while providing these components with guaranteed access to the resources they need. Jamus implements a contract-based model so as to recognise and to allow for the requirements of components regarding resource access and consumption.
Chapter PDF
Similar content being viewed by others
References
Godmar Back, Wilson C. Hsieh, and Jay Lepreau. Processes in KaffeOS: Isolation, Resource Management, and Sharing in Java. In The 4th Symposium on Operating Systems Design and Implementation, October 2000.
Godmar Back, Patrick Tullmann, Legh Stoller, Wilson C. Hsieh, and Jay Lepreau. Techniques for the Design of Java Operating Systems. In USENIX Annual Technical Conference, June 2000.
Nataraj Bagaratnan and Steven B. Byrne. Resource Access Control for an Internet UserAgent. In The 3th USENIX Conference on Object-Oriented Technologie and Systems, 1997.
Antoine Beugnard, Jean-Marc Jézéquel, Noël Plouzeau, and Damien Watkins. Making components contract-aware. In IEEE, editor, Computer, page 38–44. IEEE, June 1999.
Grzegorz Czajkowski and Thorsten von Eicken. JRes: a Resource Accounting Interface for Java. In ACM OOPSLA Conference, 1998.
David Evans. Policy-Directed Code Safety. PhD thesis, Massachussets Institute of Technology, February 2000.
David Evans and Andrew Twyman. Flexible Policy-Directed Code Safety. In IEEE Security and Privacy, May 1999.
Fangzhe Chang and Ayal Itzkovitz and Vijay Karamcheti. User-level Resourceconstrained Sandboxing. In-. The 4 th USENIX Windows Systems Symposium, August 2000.
Li Gong. Java Security: Present and Near Future. IEEE Micro,-:14–19, May 1997.
Li Gong and Roland Schemers. Implementing Protection Domains in the Java Development Kit 1.2. In Internet Society Symposium on Network and Distributed System Scurity, March 1998.
Chris Hawblitzel, Chi-Chao Chang, Grzegorz Czajkowski, Deyu Hu, and Thorsten von Eicken. Implementing Multiple Protection Domains in Java. In USENIX Annual Technical Conference, June 1998.
J.-M. Jézéquel, D. Deveaux, and Y. Le Traon. Reliable Objects: a Lightweight Approach applied to Java. IEEE Software, 18(4):76–83, July/August 2001.
Kihun Kim and Klara Nahrstedt. A Resource Broker Model with Integrated Reservation Scheme. In IEEE International Conference on Multimedia and Expo (II), pages 859–862, 2000.
U. Lindqvist, T. Olovsson, and E. Jonsson. An Analysis of a Secure System Based on Trusted Components. In Proc. 11th Ann. Conf. Computer Assurance, pages 213–223. IEEE Press, 1996.
B. Meyer, C. Mingins, and H. Schmidt. Providing Trusted Components to the Industry. IEEE Computer, pages 104–15, May 1998.
Raju Pandey and Brant Hashii. Providing Fine-Grained Access Control for Java Programs. In The 13th Conference on Object-Oriented Programming, ECOOP’99. Springer-Verlag, June 1999.
Clemens Szyperski. Component Software: Beyond Object-Oriented Programming. ACM Press, Addison-Wesley, 1998.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Le Sommer, N., Guidec, F. (2002). A Contract-Based Approach of Resource-Constrained Software Deployment. In: Bishop, J. (eds) Component Deployment. CD 2002. Lecture Notes in Computer Science, vol 2370. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45440-3_2
Download citation
DOI: https://doi.org/10.1007/3-540-45440-3_2
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-43847-2
Online ISBN: 978-3-540-45440-3
eBook Packages: Springer Book Archive