This Article 
 Bibliographic References 
 Add to: 
Protected Object References in Heterogeneous Distributed Systems
July 1993 (vol. 42 no. 7)
pp. 809-816

In object-oriented distributed processing systems, all interactions between objects occur solely through their defined external interfaces. The authors argue that object reference parameters should be supported in such systems for reasons of programming style and productivity. It is not sufficient to pass the name of an object as a string. The system must be aware of reference parameters and provide means to control and protect the delegation of access. The authors' emphasis is on motivating the need for protected object references and on showing that their efficient implementation is feasible in diverse environments. The design is guided by the principle of minimal trust. Two prototype implementations of object reference support systems are presented. One is an example in which, right from the start, object references are integrated into the design of a kernel for a network operating system for heterogeneous distributed environments. The other prototype shows how object references can be added to a popular remote procedure call package in an upwardly compatible way.

[1] A. D. Birrell, "Secure communication using remote procedure calls,"ACM Trans. Comput. Syst., vol. 3, no. 1, pp. 1-14, Feb. 1985.
[2] J. R. Corbin,The Art of Distributed Applications. Heidelberg, Germany: Springer, 1990.
[3] H. Eberle, "OViD type definition language," IBM ENC, DiME Tech. Memo. 10, June 1990, obtainable from the authors.
[4] European Computer Manufacturers Association (ECMA),Standard ECMA-127: RPC-Remote Procedure Call Using OSI, ECMA, Geneva, Switzerland, Jan. 1990.
[5] M. Gasser, A. Goldstein, C. Kaufman, and B. Lampson, "The digital distributed system security architecture," inProc. 1989 Nat. Computer Security Conf., 1990.
[6] K. Geihs, B. Schöner, U. Hollberg, H. Schmutz, and H. Eberle, "An architecture for the cooperation of heterogeneous operating systems," inProc. IEEE Computer Networking Symp., Washington, DC, Apr. 1988.
[7] K. Geihs and U. Hollberg, "Retrospective on DACNOS,"Commun. ACM, vol. 33, no. 4, pp. 439-448, Apr. 1990.
[8] G. Harter and K. Geihs, "An accounting service for heterogeneous distributed environments," inProc. 8th Int. Conf. Distributed Computing Systems, San Jose, CA, IEEE, June 1988.
[9] M. Kong et al.,Network Computing System Reference Manual, Prentice Hall, Englewood Cliffs, N.J., 1990.
[10] "OSF chooses the technologies for its distributed computing environment,"Open Syst. Newsletter, vol. 4, no. 6, June 1990.
[11] J. G. Steiner, C. Neuman, and J. I. Schiller, "Kerberos: An authentication service for open network systems," inProc. Usenix Conf., Dallas, TX, Feb. 1988.
[12] A. S. Tanenbaum, S. J. Mullender, and R. van Renesse, "Using sparse capabilities in a distributed operating system," inProc. 6th Int. Conf. Distributed Computing Systems, IEEE, Cambridge, MA, May 1986.
[13] L. Zahn et al.,Network Computing Architecture, Prentice-Hall, Englewood Cliffs, NJ., 1990.

Index Terms:
protected object references; heterogeneous distributed systems; object-oriented distributed processing systems; programming style; productivity; implementation; object reference support systems; kernel; network operating system; remote procedure call package; distributed processing; network operating systems; object-oriented programming; security of data.
K. Geihs, R. Heite, U.H. Hollberg, "Protected Object References in Heterogeneous Distributed Systems," IEEE Transactions on Computers, vol. 42, no. 7, pp. 809-816, July 1993, doi:10.1109/12.237721
Usage of this product signifies your acceptance of the Terms of Use.